Networking in 2024
Network Flow Models and Applications
by
Singh, Shruti
Sichere Übertragung medizinischer Daten in einem drahtlosen Körperbereichsnetz
by
Shankar, Shashi Kant, Tomar, Anurag Singh
Transmission sécurisée de données médicales dans un réseau corporel sans fil
by
Shankar, Shashi Kant, Tomar, Anurag Singh
Trasmissione sicura di dati medici in una rete corporea wireless
by
Shankar, Shashi Kant, Tomar, Anurag Singh
Transmissão segura de dados médicos numa rede corporal sem fios
by
Shankar, Shashi Kant, Tomar, Anurag Singh
Безопасная передача мед&
by
Шанкар, Ша&#, Томар, Ану&#
Fundamentos do processamento de grandes volumes de dados
by
Sinha, Jaya, Akilan, T., M, Chadraprabha
Grundlagen der Big Data-Verarbeitung
by
Akilan, T., M, Chadraprabha, Sinha, Jaya
Fondements du traitement des données massives
by
Akilan, T., M, Chadraprabha, Sinha, Jaya
Fondamenti dell'elaborazione dei Big Data
by
Sinha, Jaya, Akilan, T., M, Chadraprabha
Основы обработки больши&
by
Акилан, Т., М., Чадрапр&#, Синха, Яя
Malware Reverse Engineering: Cracking The Code
by
Botwright, Rob
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021
by
Cellular Vehicle-To-Everything (C-V2x)
by
Chen, Shanzhi, Hu, Jinling, Zhao, Li
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices
by
Abich, Geancarlo, Ost, Luciano, Reis, Ricardo
The Freelancer's Guide to Lifelong Learning
by
Khurana, Ayaan
Microsoft Office 365 for Beginners: Practical step-by-step manual, Microsoft Excel, learning basic and advanced features formulas with clear examples
by
Malley, David R.
Defense In Depth: Network Security And Cyber Resilience
by
Botwright, Rob
Where Cross-Border Payments Fail: Examining the Friction Facing Global Transfers
by
Jonathan T Morgan
Cyberaktivismus und kollektives Handeln. Eine Ethnographie des Pedals in Quito
by
Rodriguez Mera, Andres
Cyberactivism and collective action. An ethnography of the pedal in Quito
by
Rodriguez Mera, Andres
Cyberactivisme et action collective. Une ethnographie de la pédale à Quito
by
Rodriguez Mera, Andres
Cyberattivismo e azione collettiva. Un'etnografia del pedale a Quito
by
Rodriguez Mera, Andres
Ciberactivismo e ação colectiva. Uma etnografia do pedal em Quito
by
Rodriguez Mera, Andres
Киберактивизм и коллект&
by
Родригес 
Prioritäts-Warteschlangen-Modell
by
Gupta, Deepak, Tripathi, Adesh Kumar, Saini, Aarti
Modèle de file d'attente prioritaire
by
Saini, Aarti, Gupta, Deepak, Tripathi, Adesh Kumar
Modello di coda di priorità
by
Gupta, Deepak, Tripathi, Adesh Kumar, Saini, Aarti
Modelo de fila de espera prioritária
by
Saini, Aarti, Gupta, Deepak, Tripathi, Adesh Kumar
Модель приоритетной оче&
by
Саини, Аар&#, Трипатхи, &#, Гупта, Дее&#
Enabling Technologies for Smart Fog Computing
by
Dhatterwal, Jagjit Singh, Jaglan, Vivek, Kaswan, Kuldeep Singh
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Edge Intelligent Computing Systems in Different Domains
by
Fantacci, Romano, Picano, Benedetta
Wireless Localization Techniques
by
Tong, Xinyu, Wang, Xinbing, Tian, Xiaohua
Advanced Networking: Vanet
by
Ramasamy, Gunavathi, Shiddharthy, R.
Lora Localization: System Design and Performance Analysis
by
Gu, Chaojie, Shi, Zhiguo, He, Shibo
Cryptocoding Based on Quasigroups
by
Popovska-Mitrovikj, Aleksandra, Bakeva, Verica, Mechkaroska, Daniela
Data Mining and Data Warehousing
by
Gayathri, S.
Auf dem Weg zu zuverlässigen IMS-basierten Netzen
by
Mazri, Tomader, Hmina, Nabil, Ed-Daoui, Ilyas
Vers des réseaux fiables basés sur l'IMS
by
Mazri, Tomader, Hmina, Nabil, Ed-Daoui, Ilyas
Verso reti affidabili basate su IMS
by
Mazri, Tomader, Hmina, Nabil, Ed-Daoui, Ilyas
Rumo a redes fiáveis baseadas no IMS
by
Ed-Daoui, Ilyas, Mazri, Tomader, Hmina, Nabil
На пути к надежным сетям l
by
Эд-Дауи, Ил&, Мазри, Том&#, Хмина, Наб&#
Entschärfung von Blackhole-Angriffen mit IDS in mobilen Adhoc-Netzen
by
Nagappan, Kamaraj, Thirumalaisamy, Manikandan
Atténuation de l'attaque par trou noir à l'aide d'un système de détection d'intrusion dans les réseaux mobiles adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
Mitigazione degli attacchi blackhole tramite IDS nelle reti mobili adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
Смягчение атаки "черных д
by
Тирумала
, Нагаппан, &#
Mitigação do ataque Blackhole usando IDS em redes móveis Adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
English to Marathi Translator Using Hybrid Approach
by
Raut, Swati, Thigale, Dr Somnath, Kale, Gajanan
Implementação de UAV geográfico e segurança
by
Sohal, Asha, Ujjwal, R. L.
Implementierung von Geographic UAV und Sicherheit
by
Sohal, Asha, Ujjwal, R. L.
Mise en oeuvre de l'UAV géographique et de la sécurité
by
Sohal, Asha, Ujjwal, R. L.
Implementazione di UAV geografici e sicurezza
by
Ujjwal, R. L., Sohal, Asha
Внедрение географическ&#
by
Сохал, Аша, Уййвал, Р. Л.
Micropolis BBS Primer
by
Micropolis Handbooks
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
by
Sharma, Manish
Autonomous Driving Network: Network Architecture in the Era of Autonomy
by
Dang, Wenshuan, Huang, River, Yu, Yijun
Scope Complexity Management Planning, Public Software Projects
by
Nakirijja, Justine
Security in Smart Home Networks
by
Meng, Yan, Zhu, Haojin, Shen
Composable Enterprise: Agil, Flexibel, Innovativ: Gamechanger Für Organisation, Digitalisierung Und Unternehmenssoftware
by
Scheer, August-Wilhelm
Routing in Wireless Mesh Networks
by
Kumar, Raghav
Electrical Machines and Their Applications
by
Gonen, Turan, Mehrizi-Sani, Ali
Hands-on ESP32 with Arduino IDE: Unleash the power of IoT with ESP32 and build exciting projects with this practical guide
by
Zulfiqar, Asim
Blühendes Grün bei Routern
by
Chinnadurai, Meenu Kumari
Prospérer l'écologie dans les routeurs
by
Chinnadurai, Meenu Kumari
Процветающая экологичн&#
by
Чиннадур

Guide to Computer Network Security
by
Kizza, Joseph Migga
Qualidade de serviços baseada no encaminhamento em redes IP
by
Kale, Gajanan, Thigale, Somnath, Honkalas, Abhiman
Qualità dei servizi basata sul routing nelle reti IP
by
Kale, Gajanan, Thigale, Somnath, Honkalas, Abhiman
Communication Electronics: RF Design with Practical Applications using Pathwave/ADS Software
by
Long, Stephen
BGP from Theory to Practice
by
Prado, Antonio, Tofoni, Tiziano, Luciani, Flavio
Au delà des filtrages
by
Kianza, Nër Grâce
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
by
Sturm, Christian, Cohen, David
Mastering Amazon DynamoDB: From Basics to Scalability
by
Hussain, Kameron, Hussain, Frahaan
Zero-trust - An Introduction
by
Madsen, Tom
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
by
Nomani, Qamar
Generic and Energy-Efficient Context-Aware Mobile Sensing
by
Liu, Chi Harold, Yurur, Ozgur
Network Architect's Handbook: An expert-led journey to building a successful career as a network architect
by
Ali, Alim H.
TCP/IP: Network+ Protocols And Campus LAN Switching Fundamentals
by
Botwright, Rob
Multi-Data Transmission for sensor Network
by
Awadh Saeed Bahmaid, Salem Abdulla, V, Vasanthi
Intrusion Detection System Using MANET
by
Sule, Sneha, Soni, Priyanka, Choubey, Poonam
Secure Data Communication for Cluster Based Wireless Sensor Networks
by
Hanfi, Rabiya, Rai, Kalpana, Awasthi, Ankita
Go Programming Cookbook: Over 75+ recipes to program microservices, networking, database and APIs using Golang
by
Taylor, Ian
Reconfigurable Intelligent Surface-Enabled Integrated Sensing and Communication in 6g
by
Liu, Chenxi, Peng, Mugen, Hu, Xiaoling
Улучшенная ABR-маршрутизаm
by
C, Калайван&, K, Гита, K, Раджан
Ein erweitertes ABR-Routing mit Vertrauen zur Abschwächung von Netzwerkangriffen
by
K, Geetha, S, Kalaivani, C, Rajan
Routage ABR amélioré avec confiance pour atténuer les attaques du réseau
by
K, Geetha, S, Kalaivani, C, Rajan
Un Routing ABR migliorato con fiducia per mitigare gli attacchi alla rete
by
S, Kalaivani, C, Rajan, K, Geetha
Um encaminhamento ABR melhorado com confiança para atenuar os ataques à rede
by
K, Geetha, S, Kalaivani, C, Rajan
Erweiterung von NS-2 für die Simulation eines Lokalisierungsalgorithmus
by
Naguib, Abdelhady
Extension de NS-2 pour la simulation d'un algorithme de localisation
by
Naguib, Abdelhady
Расширение NS-2 для моделир
by
Нагуиб, Аб&#
Estensione di NS-2 per la simulazione di un algoritmo di localizzazione
by
Naguib, Abdelhady
Extensão do NS-2 para Simular um Algoritmo de Localização
by
Naguib, Abdelhady
"Cloud Computing: Navigating the Digital Skyline"
by
Sohal, Asha
Mobile Networks and Technologies
by
Selvan, Dr Mercy Paul, Jancy, Dr S., Mary, Dr Viji Amutha
Conformité aux normes de sécurité des systèmes d'information
by
Lamien, Salia
Asynchronous Programming in Rust: Learn asynchronous programming by building working examples of futures, green threads, and runtimes
by
Samson, Carl Fredrik
An Ultimate User Guide for Mastering OnePlus: A Comprehensive and In-Depth Practical Guide with Tips and Trick to Maximizing Your Use to Unlocking the
by
Kelly, Eugene J.
Decentralized Technology: Revolutionizing Transactions with Blockchains
by
Kait, Ramesh, Sohal, Asha
Efficient Workload Allocation in Fog-Cloud Networks
by
Kait, Ramesh, Sohal, Asha