Networking in 2024
Malware Reverse Engineering: Cracking The Code
by
Botwright, Rob
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021
by
The Freelancer's Guide to Lifelong Learning
by
Khurana, Ayaan
Cellular Vehicle-To-Everything (C-V2x)
by
Zhao, Li, Chen, Shanzhi, Hu, Jinling
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices
by
Reis, Ricardo, Abich, Geancarlo, Ost, Luciano
Microsoft Office 365 for Beginners: Practical step-by-step manual, Microsoft Excel, learning basic and advanced features formulas with clear examples
by
Malley, David R.
Defense In Depth: Network Security And Cyber Resilience
by
Botwright, Rob
Where Cross-Border Payments Fail: Examining the Friction Facing Global Transfers
by
Jonathan T Morgan
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Enabling Technologies for Smart Fog Computing
by
Jaglan, Vivek, Kaswan, Kuldeep Singh, Dhatterwal, Jagjit Singh
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Advanced Networking: Vanet
by
Ramasamy, Gunavathi, Shiddharthy, R.
Edge Intelligent Computing Systems in Different Domains
by
Picano, Benedetta, Fantacci, Romano
Wireless Localization Techniques
by
Wang, Xinbing, Tian, Xiaohua, Tong, Xinyu
Lora Localization: System Design and Performance Analysis
by
Shi, Zhiguo, He, Shibo, Gu, Chaojie
Cryptocoding Based on Quasigroups
by
Mechkaroska, Daniela, Popovska-Mitrovikj, Aleksandra, Bakeva, Verica
Entschärfung von Blackhole-Angriffen mit IDS in mobilen Adhoc-Netzen
by
Nagappan, Kamaraj, Thirumalaisamy, Manikandan
Implementação de UAV geográfico e segurança
by
Sohal, Asha, Ujjwal, R. L.
English to Marathi Translator Using Hybrid Approach
by
Kale, Gajanan, Raut, Swati, Thigale, Dr Somnath
Data Mining and Data Warehousing
by
Gayathri, S.
Implementierung von Geographic UAV und Sicherheit
by
Sohal, Asha, Ujjwal, R. L.
Mise en oeuvre de l'UAV géographique et de la sécurité
by
Ujjwal, R. L., Sohal, Asha
Implementazione di UAV geografici e sicurezza
by
Ujjwal, R. L., Sohal, Asha
Внедрение географическ&#
by
Уййвал, Р. Л., Сохал, Аша
Auf dem Weg zu zuverlässigen IMS-basierten Netzen
by
Ed-Daoui, Ilyas, Mazri, Tomader, Hmina, Nabil
Vers des réseaux fiables basés sur l'IMS
by
Hmina, Nabil, Ed-Daoui, Ilyas, Mazri, Tomader
Verso reti affidabili basate su IMS
by
Ed-Daoui, Ilyas, Mazri, Tomader, Hmina, Nabil
Rumo a redes fiáveis baseadas no IMS
by
Hmina, Nabil, Ed-Daoui, Ilyas, Mazri, Tomader
На пути к надежным сетям l
by
Хмина, Наб&#, Эд-Дауи, Ил&, Мазри, Том&#
Atténuation de l'attaque par trou noir à l'aide d'un système de détection d'intrusion dans les réseaux mobiles adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
Mitigazione degli attacchi blackhole tramite IDS nelle reti mobili adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
Смягчение атаки "черных д
by
Тирумала
, Нагаппан, &#
Mitigação do ataque Blackhole usando IDS em redes móveis Adhoc
by
Thirumalaisamy, Manikandan, Nagappan, Kamaraj
Autonomous Driving Network: Network Architecture in the Era of Autonomy
by
Huang, River, Yu, Yijun, Dang, Wenshuan
Micropolis BBS Primer
by
Micropolis Handbooks
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
by
Sharma, Manish
Scope Complexity Management Planning, Public Software Projects
by
Nakirijja, Justine
Security in Smart Home Networks
by
Shen, Meng, Yan, Zhu, Haojin
Composable Enterprise: Agil, Flexibel, Innovativ: Gamechanger Für Organisation, Digitalisierung Und Unternehmenssoftware
by
Scheer, August-Wilhelm
Hands-on ESP32 with Arduino IDE: Unleash the power of IoT with ESP32 and build exciting projects with this practical guide
by
Zulfiqar, Asim
Routing in Wireless Mesh Networks
by
Kumar, Raghav
Electrical Machines and Their Applications: International Student Edition
by
Mehrizi-Sani, Ali
Prospérer l'écologie dans les routeurs
by
Chinnadurai, Meenu Kumari
Процветающая экологичн&#
by
Чиннадур

Guide to Computer Network Security
by
Kizza, Joseph Migga
Communication Electronics: RF Design with Practical Applications using Pathwave/ADS Software
by
Long, Stephen
BGP from Theory to Practice
by
Tofoni, Tiziano, Luciani, Flavio, Prado, Antonio
Au delà des filtrages
by
Kianza, Nër Grâce
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
by
Cohen, David, Sturm, Christian
Mastering Amazon DynamoDB: From Basics to Scalability
by
Hussain, Kameron, Hussain, Frahaan
Generic and Energy-Efficient Context-Aware Mobile Sensing
by
Liu, Chi Harold, Yurur, Ozgur
Zero-trust - An Introduction
by
Madsen, Tom
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
by
Nomani, Qamar
Network Architect's Handbook: An expert-led journey to building a successful career as a network architect
by
Ali, Alim H.
TCP/IP: Network+ Protocols And Campus LAN Switching Fundamentals
by
Botwright, Rob
Intrusion Detection System Using MANET
by
Sule, Sneha, Soni, Priyanka, Choubey, Poonam
Go Programming Cookbook: Over 75+ recipes to program microservices, networking, database and APIs using Golang
by
Taylor, Ian
Reconfigurable Intelligent Surface-Enabled Integrated Sensing and Communication in 6g
by
Peng, Mugen, Hu, Xiaoling, Liu, Chenxi
Улучшенная ABR-маршрутизаm
by
C, Калайван&, K, Гита, K, Раджан
Ein erweitertes ABR-Routing mit Vertrauen zur Abschwächung von Netzwerkangriffen
by
C, Rajan, K, Geetha, S, Kalaivani
Routage ABR amélioré avec confiance pour atténuer les attaques du réseau
by
C, Rajan, K, Geetha, S, Kalaivani
Un Routing ABR migliorato con fiducia per mitigare gli attacchi alla rete
by
S, Kalaivani, C, Rajan, K, Geetha
Erweiterung von NS-2 für die Simulation eines Lokalisierungsalgorithmus
by
Naguib, Abdelhady
Extension de NS-2 pour la simulation d'un algorithme de localisation
by
Naguib, Abdelhady
Расширение NS-2 для моделир
by
Нагуиб, Аб&#
Estensione di NS-2 per la simulazione di un algoritmo di localizzazione
by
Naguib, Abdelhady
Um encaminhamento ABR melhorado com confiança para atenuar os ataques à rede
by
S, Kalaivani, C, Rajan, K, Geetha
Extensão do NS-2 para Simular um Algoritmo de Localização
by
Naguib, Abdelhady
Asynchronous Programming in Rust: Learn asynchronous programming by building working examples of futures, green threads, and runtimes
by
Samson, Carl Fredrik
An Ultimate User Guide for Mastering OnePlus: A Comprehensive and In-Depth Practical Guide with Tips and Trick to Maximizing Your Use to Unlocking the
by
Kelly, Eugene J.
Juniper Junos Network Associate - Student Guide: The complete guide for Juniper Junos on the associate level
by
Haddad, Maher
Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks
by
Fahmy, Hossam Mahmoud Ahmad
iPhone 16 User Guide: A Comprehensive Guide to Using the New iPhone 16 Pro & Pro Max: Step-by-Step Instructions for Seniors and Novices with
by
Amber, Chris
Sdn and Nfv: A New Dimension to Virtualization
by
Benkhelifa, Elhadj, Gupta, Brij B., Dahiya, Amrita
Internet of Things from Scratch: Build IoT solutions for Industry 4.0 with ESP32, Raspberry Pi, and AWS
by
Gondosubroto, Renaldi
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Dai, Yafei, Chen, Guihai, Li, Zhenhua
Virtualisation et clients légers - une enquête sur les postes de travail virtuels (VDI)
by
Wall, Tom
Communication Efficient Federated Learning for Wireless Networks
by
Chen, Mingzhe, Cui, Shuguang
Exploring Connectivity Patterns Graph Theory in Chemistry
by
Martin, Jon
Виртуализация и тонкий к
by
Уолл, Том
Approches de détection d'intrusion basées sur des modèles pour la sécurité dans les réseaux mobiles ad hoc (MANET)
by
Avula, Damodaram, Konagala, Pavani
Approcci di rilevamento delle intrusioni basati su modelli per la sicurezza nelle MANET
by
Konagala, Pavani, Avula, Damodaram
Abordagens de deteção de intrusão baseadas em modelos para segurança em MANETs
by
Avula, Damodaram, Konagala, Pavani
Подходы к обнаружению вт
by
Конагала, &#, Авула, Дам&#
Modellbasierte Intrusion Detection Ansätze für die Sicherheit in MANETs
by
Konagala, Pavani, Avula, Damodaram
Networking - Expand your network professional
by
Guéchi, Yves
Migrating to SAP S/4hana: Operating Models, Migration Scenarios, Tools, and Implementation
by
Densborn, Frank, Höft, Martina, Finkbohner, Frank
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
by
Dahir, Hazim, Santos, Omar, Salam, Samer