Networking in 2013
Survey of Cloud Computing
by
Furht, Borko
Strategisches Projektmanagement im Gesundheitswesen: Wie Stakeholder auf ein Sensitivitätsmodell einwirken - eine Analyse
by
Moser, Hannes
Effective Monitoring and Alerting: For Web Operations
by
Ligus, Slawek
Rapid SharePoint 2013 Collaboration Solution Development and Deployment
by
Pentsarskyy, Yaroslav
Look Smarter Than You Are with Hyperion Planning 11.1.2: Creating Hyperion Planning Applications
by
McMullen, Tracy, Roske, Edward
Formal Description Techniques and Protocol Specification, Testing and Verification: Forte X / Pstv XVII '97
by
Togashi, Atsushi, Mizuno, Tadanori, Shiratori, Norio
Guide to Voice and Video Over IP: For Fixed and Mobile Networks
by
Mkwawa, Is-Haka, Jammeh, Emmanuel, Sun, Lingfen
Juniper Networks Warrior
by
Southwick, Peter
Windows Server 2012: Up and Running: Upgrading, Installing, and Optimizing Windows Server 2012
by
Lynn, Samara
Intelligent Networks: Proceedings of the Ifip Workshop on Intelligent Networks 1994
by
Harju, Jarmo, Karttunen, Tapani, Martikainen, Olli
Routing for Wireless Multi-Hop Networks
by
Abdel Hamid, Sherin, Hassanein, Hossam S., Takahara, Glen
Protocol Test Systems: 7th Workshop 7th Ifip Wg 6.1 International Workshop on Protocol Text Systems
by
Scalable Computing and Communications: Theory and Practice
by
Wang, Lizhe, Khan, Samee U., Zomaya, Albert Y.
Motioncast for Mobile Wireless Networks
by
Wang, Xinbing
Advancing Cyber Security
by
Thames Lane
Look Smarter Than You Are with Hyperion Planning 11.1.2: Advanced Hyperion Planning
by
Roske, Edward, McMullen, Tracy
Modeling and Analysis of Computer Communications Networks
by
Hayes, Jeremiah F.
Computation and Storage in the Cloud: Understanding the Trade-Offs
by
Chen, Jinjun, Yuan, Dong, Yang, Yun
AD Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, Second Edition
by
Sarkar, Subir Kumar, Basavaraju, T. G., Puttamadappa, C.
SS7 - The Quiet Revolution That Changed Your Telephone Service
by
Harvey, Ralph
Ten Steps to ITSM Success
by
Esposito, Angelo, Rogers, Timothy, It Governance
Securing Cloud and Mobility: A Practitioner's Guide
by
Coolidge, E. Coleen, Hourani, Paul, Lim, Ian
Intelligent Networks and Intelligence in Networks: Ifip Tc6 Wg6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 S
by
Gaïti, Dominique
Your CCNA Exam Success Strategy: The Non-Technical Guidebook for Routing & Switching
by
Bahizad, Dean, Tiwari, Vivek
Testing of Communicating Systems: Ifip Tc6 10th International Workshop on Testing of Communicating Systems, 8-10 September 1997, Cheju Island, Korea
by
Keesoo Hong, Myungchul Kim, Sungwon Kang
The Testability of Distributed Real-Time Systems
by
Schütz, Werner
Instant Citrix Security How-to
by
Jacob, Carmel
Qos Management of Web Services
by
Zheng, Zibin, Lyu, Michael R.
Networks: Emerging Topics in Computer Science
by
Bilogrevic, Igor, Rezazadeh, Arshin, Momeni, Ladan
Space Division Multiple Access for Wireless Local Area Networks
by
Van Der Perre, Liesbet, Engels, Marc, Vandenameele, Patrick
Performance Analysis of Telecommunications and Local Area Networks
by
Wah Chun Chan
Data Communication Principles: For Fixed and Wireless Networks
by
Ahmad, Aftab
Broadband Wireless Access
by
Bing, Benny
Phase-Locked Loops for Wireless Communications: Digital, Analog and Optical Implementations
by
Stephens, Donald R.
Communication Protocol Specification and Verification
by
Jirachiefpattana, Ajin, Lai, Richard
Practical Intranet Security: Overview of the State of the Art and Available Technologies
by
Ashley, Paul M., Vandenwauver, M.
Distributed Medium Access Control in Wireless Networks
by
Wang, Ping, Zhuang, Weihua
Salesforce Crm Admin Cookbook
by
Goodey, Paul
Information Systems and Data Compression
by
Seidler, Jerzy A.
Broadband Communications: The Future of Telecommunications
by
Ulrich, Roya, Kühn, Paul J.
Windows 8: The Missing Manual
by
Pogue, David
Process Improvement in Practice: A Handbook for It Companies
by
Dingsøyr, Torgeir, Moe, Nils Brede, Dybå, Tore
Unit and Ubiquitous Internet of Things
by
Ning, Huansheng
Implementing Vmware Horizon View 5.2
by
Ventresco, Jason
Android Security: Attacks and Defenses
by
Misra, Anmol, Dubey, Abhishek
Packet Guide to Voice Over IP: A System Administrator's Guide to Voip Technologies
by
Hartpence, Bruce
The Age of You: How to Understand and Benefit from Social Media and the Connected Society
by
Nistad, Stein Arne
The Age of You: How to Understand and Benefit from Social Media and the Connected Society
by
Nistad, Stein Arne
Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren: Einführung Spambekämpfung
by
Mösinger, Alexander
Networking Troubleshooting for Windows
by
Beers LLL, Robert Lee
Wireless Networking in the Developing World: Colour version
by
Authors, Wireless Networking in the Deve
Instant Traffic Analysis with Tshark How-to
by
Merino, Borja
Solarwinds Orion Network Performance Monitor
by
Dissmeyer, Joseph
Neural Network Data Analysis Using Simulnet(tm)
by
Rzempoluck, Edward J.
SharePoint 2013 Enterprise Search Walkthrough Guide
by
Mann, Steven
Mac Hacks: Tips & Tools for Unlocking the Power of OS X
by
Seibold, Chris
Distributed Space-Time Coding
by
Jing, Yindi
Data Converters for Wireless Standards
by
Shi, Chunlei, Mostafa, Ismail Mohamed
Earth System Modelling - Volume 4: IO and Postprocessing
by
Budich, Reinhard, Balaji, V., Redler, René
Wissensdatenbanken bei IT-Projekten: Projektdokumentation mit Wissensmanagement 2.X
by
Sailer, Gernot
Look Smarter Than You Are with Hyperion Planning 11.1.2: An End User's Guide
by
Roske, Edward, McMullen, Tracy
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
by
Jajodia, Sushil, Wang, Xiaoyang Sean, Peng Ning
Practical SharePoint 2013 Governance
by
Goodyear, Steve
Wireless Location in Cdma Cellular Radio Systems
by
Caffery Jr, James J.
Smart Antenna Systems and Wireless LANs
by
Okamoto, Garret
Fundamentals of Codes, Graphs, and Iterative Decoding
by
Saejoon Kim, Wicker, Stephen B.
An Introduction to Photonic Switching Fabrics
by
Hinton, H. Scott
Modeling Trust Context in Networks
by
Adali, Sibel
Twisted Network Programming Essentials: Event-Driven Network Programming with Python
by
McKellar, Jessica, Fettig, Abe
Load Balancing in Parallel Computers: Theory and Practice
by
Chenzhong Xu, Lau, Francis C. M.
Anpassung Von Open-Source-Software In Anwenderunternehmen
by
Keßler, Steffen
Ethernet Switches: An Introduction to Network Design with Switches
by
Zimmerman, Joann, Spurgeon, Charles E.
Economic Modeling in Networking: A Primer
by
Berry, Randall a., Johari, Ramesh
An Introduction to Broadband Networks: Lans, Mans, Atm, B-Isdn, and Optical Networks for Integrated Multimedia Telecommunications
by
Acampora, Anthony S.
Getting Started with Microsoft Lync Server 2013
by
Volpe, Fabrizio
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic
by
Shimonski, Robert
Aspect-Oriented Programming evaluated: A Study on the Impact that Aspect-Oriented Programming can have on Software Development Productivity
by
Kleinschmager, Sebastian
Foundations of Windows Networking: A Mirthful (Yet Surprisingly Informative) Introduction
by
Schumacher, John August
Introduction to Communication Science and Systems
by
Pierce, John R., Posner, Edward C.
Backtrack - Testing Wireless Network Security
by
Cardwell, Kevin
Oracle Soa Suite 11g Performance Cookbook
by
Wright, Nicholas, Brasier, Matthew, Addy, Mark
Error-Correction Coding for Digital Communications
by
Clark Jr, George C., Cain, J. Bibb
Sensor Networks with IEEE 802.15.4 Systems: Distributed Processing, Mac, and Connectivity
by
Verdone, Roberto, Buratti, Chiara, Martalo', Marco
Look-Ahead Based Sigma-Delta Modulation
by
Janssen, Erwin, Van Roermund, Arthur
Cooperative Management of Enterprise Networks
by
Ray, Pradeep Kumar
Multilayered Security and Privacy Protection in Car-To-X Networks: Solutions from Application Down to Physical Layer
by
Stübing, Hagen
Wireless Networking
by
Burbank, Jack L., Andrusenko, Julia, Everett, Jared S.
Distributed Graph Algorithms for Computer Networks
by
Erciyes, Kayhan
Telecommunications Switching
by
Pearce, J. Gordon
IPv6: connectar-se a l'Internet del futur
by
Ward, Alan
Potential for Data Loss from Security Protected Smartphones: Investigate how to use protective security measures from the PC world to secure Smartphon
by
Rajole, Vikas
Using Security Patterns in Web-Application
by
Alam, Shahnawaz
Packets with Deadlines: A Framework for Real-Time Wireless Networks
by
Hou, I-Hong, Kumar, P. R.