Networking in 2022
Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases
by
Raj, Pethuru, Raman, Anupama C., Subramanian, Harihara
Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases
by
Subramanian, Harihara, Raj, Pethuru, Raman, Anupama C.
Mike Meyers' Comptia Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition (Exam N10-008)
by
Jernigan, Scott
Introduction to Wireless Communications and Networks: A Practical Perspective
by
Raghunandan, Krishnamurthy
Multilayer Networks: Analysis and Visualization: Introduction to Muxviz with R
by
de Domenico, Manlio
Low Power Wireless Receivers for Iot Applications with Multi-Band Calibration Algorithms
by
Rawlins, Michael W.
IP Subnetting for Beginners: Your Complete Guide to Master IP Subnetting in 4 Simple Steps
by
Nastase, Ramon A.
Practical Guide to Salesforce Experience Cloud: Building, Enhancing, and Managing a Digital Experience with Salesforce
by
Weinmeister, Philip
Secret Colors
by
Kleppmann, Martin
Use of CNNs for the Classification of Medical Images
by
Al Omari, Marwan
Computer Networking for Beginners: The Beginner's guide for Mastering Computer Networking, the Internet and the OSI Model
by
Nastase, Ramon Adrian
Microsoft Visual C# Step by Step
by
Sharp, John
Iot Communication Performance Analysis
by
Ninagawa, Chuzo
Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners
by
Nastase, Ramon
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
by
Minella, Jennifer
Understanding Forescout CounterACT, Volume 1 Architecture, Configuration, and Troubleshooting
by
Greenlee, Marvin
Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them
by
Skulkin, Oleg
Free Space Laser Communication with Ambient Light Compensation
by
Faruque, Saleh
High-Speed Networks: A Tutorial
by
Kfoury, Elie, Crichigno, Jorge, Bou-Harb, Elias
Grokking Streaming Systems: Real-Time Event Processing
by
Fischer, Josh, Wang, Ning
Security Issues for Wireless Sensor Networks
by
Bhardwaj, Anuj, Dumka, Ankur, Verma, Parag
CYBERSECURITY and HACKING for Beginners: The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect
by
Huss, Robert M.
The Ultimate Big Crazy Wifi Antenna Guide: Projects, tips, and mods for longer range wifi
by
Collier, Philip
NG Smartphone-Benutzeraktivität und Richtungserkennung mit MQTT im IoT
by
Yamsani, Nagendar, Dhandapani, Kothandaraman, Perumal, Sivasankar
Rilevamento dell'attività e della direzione degli utenti di smartphone NG utilizzando MQTT in IoT
by
Yamsani, Nagendar, Dhandapani, Kothandaraman, Perumal, Sivasankar
Détection de l'activité et de la direction des utilisateurs de smartphones NG à l'aide de MQTT dans l'IoT
by
Yamsani, Nagendar, Dhandapani, Kothandaraman, Perumal, Sivasankar
NG Smartphone Users Activity and Direction Detection using MQTT in IoT
by
Yamsani, Nagendar, Dhandapani, Kothandaraman, Perumal, Sivasankar
Обнаружение активности &
by
Йамсани, Н&#, Дхандапа
, Перумал, С&#
Mastering Azure Security - Second Edition: Keeping your Microsoft Azure workloads safe
by
Toroman, Mustafa, Janetscheck, Tom
The Salesforce Consultant's Guide: Tools to Implement or Improve Your Client's Salesforce Solution
by
Negley, Heather
Python for ArcGIS Pro: Automate cartography and data analysis using ArcPy, ArcGIS API for Python, Notebooks, and pandas
by
Toms, Silas, Parker, Bill
China and Middle East Conflicts: Responding to War and Rivalry from the Cold War to the Present
by
Burton, Guy
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
by
Dahj, Jean Nestor M.
Policy Design in the Age of Digital Adoption: Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation
by
Ferreira, Ricardo
Future Network Architectures and Core Technologies
by
Zhang, Zhen, Lan, Ju-Long, Hu, Yu-Xiang
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
by
Tiepolo, Gianluca
Seeing Smart Cities Through a Multi-Dimensional Lens: Perspectives, Relationships, and Patterns for Success
by
McKenna, H. Patricia
Asynchronous On-Chip Networks and Fault-Tolerant Techniques
by
Zhang, Guangda, Song, Wei
The Complete Guide to Scion: From Design Principles to Formal Verification
by
Legner, Markus, Chuat, Laurent, Basin, David
6g: Sustainable Development for Rural and Remote Communities
by
Khanganba, Sanjram Premjit, Dixit, Sudhir, Bhatia, Vimal
Greenedge: New Perspectives to Energy Management and Supply in Mobile Edge Computing
by
Tang, Guoming, Guo, Deke, Wu, Kui
A Network Architect's Guide to 5g
by
Hassan, Syed, Orel, Alexander, Islam, Kashif
Hardware-Aware Probabilistic Machine Learning Models: Learning, Inference and Use Cases
by
Verhelst, Marian, Galindez Olascoaga, Laura Isabel, Meert, Wannes
Betriebssysteme Kompakt: Grundlagen, Hardware, Speicher, Daten Und Dateien, Prozesse Und Kommunikation, Virtualisierung
by
Baun, Christian
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (Englis
by
Ozkaya, Erdal
Elasticsearch 8.x Cookbook - Fifth Edition: Over 180 recipes to perform fast, scalable, and reliable searches for your enterprise
by
Paro, Alberto
Mobile App Reverse Engineering: Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
by
Mishra, Abhinav
Security without Obscurity: Frequently Asked Questions (FAQ)
by
Stapleton, Jeff
Reconfigurable Intelligent Surface-Empowered 6g
by
Di, Boya, Song, Lingyang, Zhang, Hongliang
TCP Congestion Control: A Systems Approach
by
Brakmo, Lawrence, Peterson, Larry L., Davie, Bruce S.
Progettazione e implementazione di un firewall integrato
by
Demir, Necati, Dalkılıç, Gökhan
Concepção e implementação de uma Firewall Embutida
by
Dalkılıç, Gökhan, Demir, Necati
Privacy-Preserving in Edge Computing
by
Gao, Longxiang, Luan, Tom H., Gu, Bruce
Mike Meyers' Comptia Network+ Certification Passport, Seventh Edition (Exam N10-008)
by
Weissman, Jonathan S.
Mastering Palo Alto Networks - Second Edition: Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS
by
'Reaper', Tom Piens Aka
The Big Bucks
by
Cory, Albert
Robustness Optimization for Iot Topology
by
Chen, Ning, Zhang, Songwei, Qiu, Tie
Modeling and Control of AC Machine using MATLAB(R)/SIMULINK
by
Boufadene, Mourad
Microsoft Orleans for Developers: Build Cloud-Native, High-Scale, Distributed Systems in .Net Using Orleans
by
Astbury, Richard
The DevOps Career Handbook: The ultimate guide to pursuing a successful career in DevOps
by
Knight, John, Swenson, Nate
Advanced Optical and Wireless Communications Systems
by
Djordjevic, Ivan B.
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation
by
Rossier, Samuel, Routin, David, Thoores, Simon
OPNsense Beginner to Professional: Protect networks and build next-generation firewalls easily with OPNsense
by
Camargo, Julio Cesar Bueno de