Networking in 2019
Software-Defined Cloud Centers: Operational and Management Technologies and Tools
by
Raman, Anupama, Raj, Pethuru
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
by
Reiber, Lee
Emerging Internet-Based Technologies
by
Sadiku, Matthew N. O.
Intelligence in Iot-Enabled Smart Cities
by
Al-Turjman, Fadi
Spectrum-Aware Mobile Computing: Convergence of Cloud Computing and Cognitive Networking
by
Mahmoodi, Seyed Eman, Subbalakshmi, Koduvayur, Uma, R. N.
Mobile Big Data
by
Yang, Liuqing, Fang, Luoyang, Cheng, Xiang
Mining Over Air: Wireless Communication Networks Analytics
by
Hu, Mantian, Huet, Alexis, Ouyang, Ye
Introduction to Digital Signal Processing Using MATLAB with Application to Digital Communications
by
Thyagarajan, K. S.
Building Automation: Communication Systems with Eib/Knx, Lon and Bacnet
by
Hansemann, Thomas, Merz, Hermann
Sacmat '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
by
Sacmat
IT Application Security and Control
by
Keshava Narayana, Dileep
Learning from Imbalanced Data Sets
by
Galar, Mikel, Fernández, Alberto, García, Salvador
Zabbix 4 Network Monitoring - Third Edition: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0
by
Olups, Rihards, Uytterhoeven, Patrik
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things
by
Kim, Dong-Seong, Tran-Dang, Hoa
Crowdsourcing of Sensor Cloud Services
by
Ghari Neiat, Azadeh, Bouguettaya, Athman
Binary, Subnetting, and Summarization Mastery
by
Bryant, Chris
Mastering Python Scripting for System Administrators
by
Sanjiv Naik, Ganesh
Implementing AWS: Design, Build, and Manage your Infrastructure
by
Udell, Rowan, Chan, Lucas, Wadia, Yohan
Data Infrastructure Management: Insights and Strategies
by
Schulz, Greg
Python Network Programming
by
Kathiravelu, Pradeeban, Chou, Eric, Ratan, Abhishek
Mastering Rust -Second Edition
by
Kaihlavirta, Vesa, Sharma, Rahu
Smart Stem-Driven Computer Science Education: Theory, Methodology and Robot-Based Practices
by
Burbaite, Renata, Stuikys, Vytautas
Fourier Analysis--A Signal Processing Approach
by
Sundararajan, D.
Secure Networked Inference with Unreliable Data Sources
by
Kailkhura, Bhavya, Varshney, Pramod K., Vempaty, Aditya
Getting Started with Firebird: Learning by Doing
by
Abiola-Ellison, Menkaura
Practical Social Network Analysis with Python
by
Srinivasa, K. G., Raj P. M., Krishna, Mohan, Ankith
Complex Enterprise Architecture: A New Adaptive Systems Approach
by
McDowall, John D.
Crossbar-Based Interconnection Networks: Blocking, Scalability, and Reliability
by
Jahanshahi, Mohsen, Bistouni, Fathollah
SSL/TLS. Sichere Kommunikation im Netzwerk
by
Springer, Julian
Applied Cryptography in .Net and Azure Key Vault: A Practical Guide to Encryption in .Net and .Net Core
by
Haunts, Stephen
Functional Interfaces in Java: Fundamentals and Examples
by
Lecessi, Ralph
Beginning Lora Radio Networks with Arduino: Build Long Range, Low Power Wireless Iot Networks
by
Seneviratne, Pradeeka
CCNA Security (IINS 210-260) Workbook With Practice Exam Questions: Second Edition
by
Specialist, Ip
Segmentation automatique pour la reconnaissance numérique des chèques bancaires Algériens
by
Gattal, Abdeljalil
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
by
Kirsten, Lee
An Introduction to Internet of Things(IoT)
by
Sundaram, Sureshkumar, Duraisamy, Devi Kala Rathinam, Dharmaraj, Srivaishnavi
From Gutenberg to Google: The History of Our Future
by
Wheeler, Tom
Advanced Serverless Architectures with Microsoft Azure
by
Bass, Daniel
Hands-On Application Penetration Testing with Burp Suite
by
Walikar, Riyaz, Lozano, Carlos a., Shah, Dhruv
Hands-On Penetration Testing with Kali NetHunter
by
Singh, Glen D., Oriyano, Sean-Philip
Cloud computing. A security analysis
by
Ismail, Haitham
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics
by
Yan, Wei Qi
Automate Your Network: Introducing the Modern Approach to Enterprise Network Management
by
Capobianco, John W.
Coloring Book Monsters V1: Monsters Coloring Books for Kids and Adults to Practice Your Kids or Toddlers How to Make Coloring with Fun Images in
by
Williams, Arika
Coloring Book Monster V.2 Kids Imagination: Kids Inspiration to Have Fun with Coloring Books Pages with Jumbo Giant Size Images
by
Williams, Arika
Mathematical Problems in Data Science: Theoretical and Practical Methods
by
Su, Zhixun, Jiang, Bo, Chen, Li M.
Guide to Being Black in It: How I Made It in It Without a Degree and How You Can Do the Same
by
Pearson, Derek
Mastering Windows Server 2019 - Second Edition: The complete guide for IT professionals to install and manage Windows Server 2019 and deploy new capab
by
Krause, Jordan
Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards, Third Edition
by
Sun, Huifang, Shi, Yun-Qing
AWS Certified Advanced Networking Specialty Exam Practice Questions: 350+ Exam Questions
by
Specialist, Ip
Cloud Networking for Big Data
by
Zeng, Deze, Guo, Song, Gu, Lin
Learning Python Networking - Second Edition
by
Ortega, José Manuel
Hands-On Network Programming with C# and .NET Core
by
Burns, Sean
Mobile Electric Vehicles: Online Charging and Discharging
by
Zhang, Ran, Shen, Wang, Miao
Internet of Things Projects with ESP32
by
Kurniawan, Agus
Azure Networking Cookbook
by
Toroman, Mustafa
Intelligent Automation with VMware
by
Kundan, Ajit Pratap
Applied Discrete-Time Queues
by
Alfa, Attahiru
Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools
by
Jaswal, Nipun
Head First Kotlin: A Brain-Friendly Guide
by
Griffiths, Dawn, Griffiths, David
Medienmarketing: Branding - Werbung - Corporate Identity
by
Schlaich, Patrick, Sinner, Dominik, Bühler, Peter
Internet: Technik - Nutzung - Social Media
by
Schlaich, Patrick, Sinner, Dominik, Bühler, Peter
Stochastic Geometry Analysis of Multi-Antenna Wireless Networks
by
Zhang, Jun, Yu, Xianghao, Li, Chang
Angewandte Netzwerktechnik Kompakt: Dateiformate, Übertragungsprotokolle Und Ihre Nutzung in Java-Applikationen
by
Plenk, Valentin
Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications
by
Möller, Dietmar P. F., Haas, Roland E.
Introduction to Distributed Self-Stabilizing Algorithms
by
Devismes, Stéphane, DuBois, Swan, Altisen, Karine
Linux+ and Lpic-1 Guide to Linux Certification, Loose-Leaf Version
by
Eckert, Jason
Supercomputing Frontiers: 5th Asian Conference, Scfa 2019, Singapore, March 11-14, 2019, Proceedings
by
Answering Queries Using Views, Second Edition
by
Afrati, Foto, Chirkova, Rada
Echo Dot 2nd Generation User Guide: The Essential Amazon Echo Dot 2nd Generation User Manual with Alexa
by
Garten, Paul
CompTIA Network+: A Comprehensive Beginners Guide to Learn About The CompTIA Network+ Certification from A-Z
by
Schmidt, Walker
Be the Greatest Product Manager Ever: Master Six Proven Skills to Get the Career You Want
by
Lin, Lewis C.
Green and Software-Defined Wireless Networks: From Theory to Practice
by
Yu, Guanding, Han, Shuangfeng, I, Chih-Lin
CCNA: Guía Completa para Principiantes Conoce la Certificación de Conmutación y Enrutamiento de Redes CCNA (Cisco Certified
by
Schmidt, Walker
CCNA: A Comprehensive Beginners Guide To Learn About The CCNA (Cisco Certified Network Associate) Routing And Switching Cert
by
Schmidt, Walker
Elasticsearch 7.0 Cookbook
by
Paro, Alberto
Software Defined Networks
by
Mishra, Vinod K.
Emerging Research in Computing, Information, Communication and Applications: Ercica 2018, Volume 1
by
Azure DevOps Server 2019 Cookbook
by
Arora, Tarun, Shigihalli, Utkarsh
Developing Networks Using Artificial Intelligence
by
Qian, Yi, Jiang, Chunxiao, Yao, Haipeng
Elements of Multimedia
by
Banerjee, Sreeparna
Concepts of Soft Computing: Fuzzy and Ann with Programming
by
Mahato, Nisha Rani, Sahoo, Deepti Moyi, Chakraverty, Snehashish
Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code
by
Van Winkle, Lewis
Data-Intensive Workflow Management
by
Liu, Ji, Pacitti, Esther, de Oliveira, Daniel C. M.
Network Topology and Fault-Tolerant Consensus
by
Tseng, Lewis, Sakavalas, Dimitris
How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
by
Ismail, Haitham
The Complete Kubernetes Guide
by
Sayfan, Gigi, Baier, Jonathan, White, Jesse
Introduction to DevOps with Kubernetes
by
Yılmaz, Onur, Akbaş, Süleyman