Networking in 2014
Soziologie Der Online-Kommunikation
by
Beck, Klaus
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
by
Dacosta, Francis, Henderson, Byron
SharePoint 2013 Solution Series Volumes 1-5
by
Mann, Steven
SharePoint 2013 Survey Ramp-Up Guide
by
Mann, Steven
Modifying Your Site Navigation in SharePoint 2013
by
Mann, Steven
How To Integrate BCS with Search in SharePoint 2013
by
Mann, Steven
Improving the Performance of Wireless LANs: A Practical Guide
by
Sarkar, Nurul
Wireless Sensors in Industrial Time-Critical Environments
by
Cecílio, José, Furtado, Pedro
SharePoint 2013 Solution Series Volumes 6-10
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 1-20
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 1-10
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 11-15
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 16-20
by
Mann, Steven
Collaborative Web Hosting: Challenges and Research Directions
by
Ahmed, Reaz, Boutaba, Raouf
Deep Space Telecommunications Systems Engineering
by
Administration, National Aeronautics and
Troubleshooting with Wireshark: Locate the Source of Performance Problems
by
Chappell, Laura
Packet Tracer Network Simulator
by
A, Jesin
Practical IIS: Internet Information Services in the Data Center and the Cloud
by
Walch, Helmuth, Walch, Christian
IOS and OS X Network Programming Cookbook
by
Hoffman, Jon
Mobile Intention Recognition
by
Kiefer, Peter
Administering Arcgis for Server
by
Nasser, Hussein
Vmware Vsphere 5.X Datacenter Design Cookbook
by
Cartwright, Hersey
Getting Started with Citrix Provisioning Services 7.0
by
Udayakumar, Puthiyavan
Autonomic Clustering of Distributed Agents
by
Ogston, Elizabeth
Fundamentals of Autonomic Communications: Principles for Building Autonomic Systems
by
Jennings, Brendan, Strassner, John C., Meer, Sven Van Der
Location Privacy Preservation in Cognitive Radio Networks
by
Zhang, Qian, Wang, Wei
How to Do Everything: Icloud, Second Edition
by
Rich, Jason R.
Security-Aware Cooperation in Cognitive Radio Networks
by
Mark, Jon W., Zhang, Ning
Seamless and Secure Communications Over Heterogeneous Wireless Networks
by
Cao, Jiannong, Zhang, Chisheng
XML in der NC-Verfahrenskette: Die Optimierung des Informationsflusses im Kontext eines XML-basierten Dateiformates
by
Wagner, Christian
Raspberry Pi Server Essentials
by
Kula, Piotr
Networking Services: QoS, Signaling, Processes
by
Perros, Harry
Energy Detection for Spectrum Sensing in Cognitive Radio
by
Tellambura, Chintha, Jiang, Hai, Atapattu, Saman
Wi-Fi Enabled Healthcare
by
Youssef, Ali, Linton, Jon, McDonald, Douglas, II
Communication Networks for Smart Grids: Making Smart Grid Real
by
Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Penetration Testing with Backbox
by
Umit Uygur, Stefan
Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice
by
Giusto, Paolo, Di Natale, Marco, Zeng, Haibo
Mosh (Mobile Shell): A New Era of Remote Access
by
Raj, Aditya
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
by
Reed, Andy
Networked Audiovisual Systems
by
Grimes, Brad, Avixa Inc Na
Radio Resource Management Using Geometric Water-Filling
by
Zhao, Lian, Zhou, Sheng, He, Peter
Implementation and Evaluation of a Zigbee Network
by
Takpor Temitope
Computación en la Nube
by
Arias, Angel
ELSTER - Die elektronische Steuererklärung
by
Dieter, Susanne
Dynamic Provisioning for Community Services
by
Qi, Li, Jin, Hai
Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks
by
Li, Junkun, He, Shibo, Chen, Jiming
Security for Multi-Hop Wireless Networks
by
Mahmoud, Mohamed M. E. a., Shen
Stable Throughput Regions in Wireless Networks
by
Kompella, Sastry, Ephremides, Anthony
BGP for Cisco Networks: A CCIE v5 guide to the Border Gateway Protocol
by
Fordham, Stuart D.
Learning Nagios 4
by
Kocjan, Wojciech
Running Mainframe Z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform Z Environments
by
Barrett, Kenneth, Norris, Stephen
Implementing Samba 4
by
Leal, Marcelo
Guide to OSI and TCP/IP Models
by
Alani, Mohammed M.
Network Hardening: An Automated Approach to Improving Network Security
by
Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Architectures of Small-Cell Networks and Interference Management
by
Ngo, Duy Trong, Le-Ngoc, Tho
Building Information Modeling (BIM) in der Planung von Bauleistungen
by
Albrecht, Matthias
Resource Management for Heterogeneous Networks in Lte Systems
by
Hu, Rose Qingyang, Qian, Yi
Linear Network Error Correction Coding
by
Guang, Xuan, Zhang, Zhen
Cloud Computing: Eine kritische Analyse des Cloud Computings im gewerblichen Bereich
by
Burkert, Matthias
Intelligence for Embedded Systems: A Methodological Approach
by
Alippi, Cesare
Attachment Transmission in Wireless Networks
by
Wu, Kaishun, Hamdi, Mounir, Wang, Lu
Vmware Horizon Workspace Essentials
by
Von Oven, Peter, Bjork, Peter, Lindberg, Joel
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion
by
Vasquez, Jorge
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion
by
Vasquez, Jorge
Cloud Data Management
by
Zhao, Liang, Sakr, Sherif, Liu, Anna
Pro Angularjs
by
Freeman, Adam
Digital Libraries Applications
by
Leidig, Jonathan P., Fox, Edward a.
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps: Sicherheitsanalyse von Microsoft Komponenten
by
Szameitat, Daniel
Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education
by
Controller Area Network Prototyping with Arduino
by
Voss, Wilfried
Digital Library Technologies
by
Fox, Edward a., Da Silva Torres, Ricardo
Modeling and Analysis of Voice and Data in Cognitive Radio Networks
by
Zhuang, Weihua, Gunawardena, Subodha
Cloud Computing: A Hands-On Approach
by
Madisetti, Vijay, Bahga, Arshdeep
Lets VDIfy Our Systems: What is the Virtual Desktop ?
by
Alshafee, Khalid
The Book on Networks: Everything you need to know about the Internet, Online Security and Cloud Computing.
by
Fisher, Robin
Enabling Content Distribution in Vehicular AD Hoc Networks
by
Bai, Fan, Shen, Luan, Tom H.
Applied Optimization Methods for Wireless Networks
by
Sherali, Hanif D., Hou, Y. Thomas, Shi, Yi
Autonomic Computing Enabled Cooperative Networked Design
by
Wódczak, Michal
Future Wireless and Optical Networks: Networking Modes and Cross-Layer Design
by
Jiang, Shengming
Elasticsearch Server Second Edition
by
Rogozi Ski, Marek, Ku, Rafa
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications
by
Messier, Ric
Learning Veeam(r) Backup and Replication for Vmware Vsphere
by
Mohn, Christian
Exchange Online Fast Start: A Quick Start Guide for Exchange Online, Office 365 and Windows Azure
by
Training Solutions, Smart Brain
Fundamentals of Multimedia
by
Li, Ze-Nian, Drew, Mark S., Liu, Jiangchuan
Fundamentals of Diffusion-Based Molecular Communication in Nanonetworks
by
Akyildiz, Ian F., Pierobon, Massimiliano
Using Security Patterns in Web -Application
by
Alam, Shahnawaz
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
by
Watson, Gavin, Mason, Andrew, Ackroyd, Richard
Designing a Digital Future: Report to the President and Congress
by
Executive Office of the President
Evolutionary Algorithms for Mobile AD Hoc Networks
by
Danoy, Grégoire, Dorronsoro, Bernabé, Ruiz, Patricia
XML Fast Start: A Quick Start Guide for XML
by
Training Solutions, Smart Brain
Ethernet: The Definitive Guide: Designing and Managing Local Area Networks
by
Zimmerman, Joann, Spurgeon, Charles E.
Heroku Cloud Application Development
by
Hanjura, Anubhav
Windows 7 Fast Start: A Quick Start Guide for Windows 7
by
Training Solutions, Smart Brain
Distributed Context-Aware Systems
by
Ferreira, Paulo, Alves, Pedro
Ranking for Web Data Search Using On-The-Fly Data Integration
by
Herzig, Daniel Markus
Secure and Efficient IP Mobility Support for Aeronautical Communications
by
Bauer, Christian
Satellite Network Robust Qos-Aware Routing
by
Long, Fei
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach: Security in Cloud Computing
by
Dhivakar, Ashwin
Guia de Configuracao Para O Asterisk Pbx: Como Construir Um Pabx Com Software Livre
by
Goncalves, Flavio Eduardo
Cloud Computing Basics
by
Srinivasan, S.
Big Data: Related Technologies, Challenges and Future Prospects
by
Zhang, Yin, Chen, Min, Mao, Shiwen
Cognitive Resource Management for Heterogeneous Cellular Networks
by
Liu, Yongkang, Shen
Querying Over Encrypted Data in Smart Grids
by
Liang, Xiaohui, Wen, Mi, Lu, Rongxing
Flexible Application-Layer Multicast in Heterogeneous Networks
by
Hübsch, Christian
Advanced Signaling Support for IP-based Networks
by
Röhricht, Martin
Software Defined Networks: A Comprehensive Approach
by
Goransson, Paul, Black, Chuck
Rapid Prototyping with JS: Agile JavaScript Development
by
Mardan, Azat
Game Theory Applications in Network Design
by
Kim, Sungwook
Characterization, Avoidance and Repair of Packet Collisions in Inter-Vehicle Communication Networks
by
Mittag, Jens
Virtualization Techniques for Mobile Systems
by
Agarwal, Ankur, Furht, Borko, Jaramillo, David
System Center 2012 R2 Virtual Machine Manager Cookbook (Update)
by
Alessandro Cardoso, Edvaldo
Building Virtual Pentesting Labs for Advanced Penetration Testing
by
Cardwell, Kevin
Auction Design for the Wireless Spectrum Market
by
Feng, Xiaojun, Zhang, Qian, Lin, Peng
Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking
by
Townsend, Kevin, Cufí, Carles, Akiba
System Center 2012 R2 Configuration Manager: Mastering the Fundamentals
by
Agerlund, Kent
Impossibility Results for Distributed Computing
by
Ellen, Faith, Attiya, Hagit
Emerging Trends in Communication Networks
by
Hasan, Syed Faraz
Potential for Data Loss from Security Protected Smartphones
by
Rajole, Vikas
High-Performance Computational Solutions in Protein Bioinformatics
by
Mrozek, Dariusz
Maritime Wideband Communication Networks: Video Transmission Scheduling
by
Shen, Yang, Tingting
Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren
by
Harnau, Yvonne
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
by
Chen, Yingying, Trappe, Wade, Yang, Jie