Networking in 2024
Malware Reverse Engineering: Cracking The Code
by
Botwright, Rob
Cellular Vehicle-To-Everything (C-V2x)
by
Zhao, Li, Chen, Shanzhi, Hu, Jinling
Transmission and Closeness Centrality in Networks
by
P, Jane Olive Sharon
Microsoft Office 365 for Beginners: Practical step-by-step manual, Microsoft Excel, learning basic and advanced features formulas with clear examples
by
Malley, David R.
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices
by
Reis, Ricardo, Abich, Geancarlo, Ost, Luciano
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021
by
The Freelancer's Guide to Lifelong Learning
by
Khurana, Ayaan
Defense In Depth: Network Security And Cyber Resilience
by
Botwright, Rob
Enabling Technologies for Smart Fog Computing
by
Jaglan, Vivek, Kaswan, Kuldeep Singh, Dhatterwal, Jagjit Singh
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Edge Intelligent Computing Systems in Different Domains
by
Fantacci, Romano, Picano, Benedetta
Advanced Networking: Vanet
by
Ramasamy, Gunavathi, Shiddharthy, R.
Wireless Localization Techniques
by
Tong, Xinyu, Wang, Xinbing, Tian, Xiaohua
Lora Localization: System Design and Performance Analysis
by
Gu, Chaojie, Shi, Zhiguo, He, Shibo
Cryptocoding Based on Quasigroups
by
Bakeva, Verica, Mechkaroska, Daniela, Popovska-Mitrovikj, Aleksandra
Micropolis BBS Primer
by
Micropolis Handbooks
Entschärfung von Blackhole-Angriffen mit IDS in mobilen Adhoc-Netzen
by
Nagappan, Kamaraj, Thirumalaisamy, Manikandan
Implementação de UAV geográfico e segurança
by
Ujjwal, R. L., Sohal, Asha
English to Marathi Translator Using Hybrid Approach
by
Raut, Swati, Thigale, Dr Somnath, Kale, Gajanan
Data Mining and Data Warehousing
by
Gayathri, S.
Implementierung von Geographic UAV und Sicherheit
by
Sohal, Asha, Ujjwal, R. L.
Mise en oeuvre de l'UAV géographique et de la sécurité
by
Sohal, Asha, Ujjwal, R. L.
Implementazione di UAV geografici e sicurezza
by
Ujjwal, R. L., Sohal, Asha
Внедрение географическ&#
by
Сохал, Аша, Уййвал, Р. Л.
Auf dem Weg zu zuverlässigen IMS-basierten Netzen
by
Mazri, Tomader, Hmina, Nabil, Ed-Daoui, Ilyas
Vers des réseaux fiables basés sur l'IMS
by
Ed-Daoui, Ilyas, Mazri, Tomader, Hmina, Nabil
Verso reti affidabili basate su IMS
by
Mazri, Tomader, Hmina, Nabil, Ed-Daoui, Ilyas
Rumo a redes fiáveis baseadas no IMS
by
Hmina, Nabil, Ed-Daoui, Ilyas, Mazri, Tomader
На пути к надежным сетям l
by
Эд-Дауи, Ил&, Мазри, Том&#, Хмина, Наб&#
Atténuation de l'attaque par trou noir à l'aide d'un système de détection d'intrusion dans les réseaux mobiles adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
Mitigazione degli attacchi blackhole tramite IDS nelle reti mobili adhoc
by
Nagappan, Kamaraj, Thirumalaisamy, Manikandan
Смягчение атаки "черных д
by
Тирумала
, Нагаппан, &#
Mitigação do ataque Blackhole usando IDS em redes móveis Adhoc
by
Nagappan, Kamaraj, Thirumalaisamy, Manikandan
Autonomous Driving Network: Network Architecture in the Era of Autonomy
by
Huang, River, Yu, Yijun, Dang, Wenshuan
Scope Complexity Management Planning, Public Software Projects
by
Nakirijja, Justine
Composable Enterprise: Agil, Flexibel, Innovativ: Gamechanger Für Organisation, Digitalisierung Und Unternehmenssoftware
by
Scheer, August-Wilhelm
Security in Smart Home Networks
by
Meng, Yan, Zhu, Haojin, Shen
Electrical Machines and Their Applications
by
Mehrizi-Sani, Ali
Hands-on ESP32 with Arduino IDE: Unleash the power of IoT with ESP32 and build exciting projects with this practical guide
by
Zulfiqar, Asim
Prospérer l'écologie dans les routeurs
by
Chinnadurai, Meenu Kumari
Процветающая экологичн&#
by
Чиннадур

Guide to Computer Network Security
by
Kizza, Joseph Migga
Unlocking the Power of Raspberry Pi 5: Your Complete Guide from Setup to Expert Projects
by
Nolan, Abel
Communication Electronics: RF Design with Practical Applications using Pathwave/ADS Software
by
Long, Stephen
BGP from Theory to Practice
by
Prado, Antonio, Tofoni, Tiziano, Luciani, Flavio
Mastering IPv6: From Addressing Basics to Advanced Deployment Techniques
by
Musudia, Kevogo
Au delà des filtrages
by
Kianza, Nër Grâce
Effective Attack Handling Methods for Layer Wise Spoofing Based Man in the Middle Attacks in Machine to Machine Networks
by
A, Sabitha Banu
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
by
Sturm, Christian, Cohen, David
Generic and Energy-Efficient Context-Aware Mobile Sensing
by
Yurur, Ozgur, Liu, Chi Harold
Network Architect's Handbook: An expert-led journey to building a successful career as a network architect
by
Ali, Alim H.
Zero-trust - An Introduction
by
Madsen, Tom
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
by
Nomani, Qamar
TCP/IP: Network+ Protocols And Campus LAN Switching Fundamentals
by
Botwright, Rob
Intrusion Detection System Using MANET
by
Sule, Sneha, Soni, Priyanka, Choubey, Poonam
Go Programming Cookbook: Over 75+ recipes to program microservices, networking, database and APIs using Golang
by
Taylor, Ian
Red Hat Ansible Automation Platform: Modernize Your Organization with Automation and Infrastructure as Code
by
Berton, Luca
Reconfigurable Intelligent Surface-Enabled Integrated Sensing and Communication in 6g
by
Liu, Chenxi, Peng, Mugen, Hu, Xiaoling
Улучшенная ABR-маршрутизаm
by
K, Раджан, C, Калайван&, K, Гита
Ein erweitertes ABR-Routing mit Vertrauen zur Abschwächung von Netzwerkangriffen
by
K, Geetha, S, Kalaivani, C, Rajan
Routage ABR amélioré avec confiance pour atténuer les attaques du réseau
by
K, Geetha, S, Kalaivani, C, Rajan
Un Routing ABR migliorato con fiducia per mitigare gli attacchi alla rete
by
S, Kalaivani, C, Rajan, K, Geetha
Erweiterung von NS-2 für die Simulation eines Lokalisierungsalgorithmus
by
Naguib, Abdelhady
Extension de NS-2 pour la simulation d'un algorithme de localisation
by
Naguib, Abdelhady
Расширение NS-2 для моделир
by
Нагуиб, Аб&#
Estensione di NS-2 per la simulazione di un algoritmo di localizzazione
by
Naguib, Abdelhady
Um encaminhamento ABR melhorado com confiança para atenuar os ataques à rede
by
C, Rajan, K, Geetha, S, Kalaivani
Extensão do NS-2 para Simular um Algoritmo de Localização
by
Naguib, Abdelhady
Asynchronous Programming in Rust: Learn asynchronous programming by building working examples of futures, green threads, and runtimes
by
Samson, Carl Fredrik
An Ultimate User Guide for Mastering OnePlus: A Comprehensive and In-Depth Practical Guide with Tips and Trick to Maximizing Your Use to Unlocking the
by
Kelly, Eugene J.
Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks
by
Fahmy, Hossam Mahmoud Ahmad
Juniper Junos Network Associate - Student Guide: The complete guide for Juniper Junos on the associate level
by
Haddad, Maher
Internet of Things from Scratch: Build IoT solutions for Industry 4.0 with ESP32, Raspberry Pi, and AWS
by
Gondosubroto, Renaldi
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Dai, Yafei, Chen, Guihai, Li, Zhenhua
SDN and NFV: A New Dimension to Virtualization
by
Amrita Dahiya, Elhadj Benkhelifa, Brij B Gupta
Ethical Hacking and Network Analysis with Wireshark: Exploration of Network Packets for Detecting Exploits and Malware
by
Sharma, Manish
Virtualisation et clients légers - une enquête sur les postes de travail virtuels (VDI)
by
Wall, Tom
Communication Efficient Federated Learning for Wireless Networks
by
Chen, Mingzhe, Cui, Shuguang
Виртуализация и тонкий к
by
Уолл, Том
Approches de détection d'intrusion basées sur des modèles pour la sécurité dans les réseaux mobiles ad hoc (MANET)
by
Avula, Damodaram, Konagala, Pavani
Approcci di rilevamento delle intrusioni basati su modelli per la sicurezza nelle MANET
by
Konagala, Pavani, Avula, Damodaram
Abordagens de deteção de intrusão baseadas em modelos para segurança em MANETs
by
Konagala, Pavani, Avula, Damodaram
Подходы к обнаружению вт
by
Конагала, &#, Авула, Дам&#
Modellbasierte Intrusion Detection Ansätze für die Sicherheit in MANETs
by
Konagala, Pavani, Avula, Damodaram
Migrating to SAP S/4hana: Operating Models, Migration Scenarios, Tools, and Implementation
by
Höft, Martina, Densborn, Frank, Finkbohner, Frank
Reinforcement Learning for Reconfigurable Intelligent Surfaces: Assisted Wireless Communication Systems
by
Dobre, Octavia A., Faisal, Alice, Al-Nahhal, Ibrahim