Related Articles

1 279 products in Networking

Advertisement

16% OFF
DescriptionArtificial intelligence has made some incredible leaps. Deep learning systems now deliver near-human speech and image recognition, not to mention machines capable of beating world champion Go masters. Deep learning applies to
The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and
This work studies the development of bilateral relations in two pairs of states (dyads): Argentina-Brazil and Argentina-Chile. It takes on a moderate constructivist approach that incorporates into the analysis of international relations
18% OFF
Papers collected here, from a December 2001 workshop held at the University of Central Florida, examine topics related to process coordination and ubiquitous computing. Papers on coordination models discuss areas such as
As we begin a new century, the astonishing spread of nationally and internationally accessible computer-based communication networks has touched the imagination of people everywhere. Suddenly, the Internet is in everyday parlance, featured
Protect your organisation by building a security-minded culture With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a
20% OFF
The diversity of methodologies and applications in the literature for the traffic engineering, performance modelling and analysis of convergent multiservice heterogeneous networks attests to the breath and richness of recent research and
20% OFF
Over the recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of convergent multi-service heterogeneous networks, such as wireless
21% OFF
Implement a Hyper-V virtualization solution Microsoft Virtualization with Hyper-V shows you how to deploy Microsoft's next-generation hypervisor-based server virtualization technology in a corporate environment. You'll get step-by-step guidelines for getting Hyper-V up
Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can
Providing a comprehensive set of business models for an e-business, this book enables IT managers and directors to develop and implement IT strategies and infrastructures for new models of doing business based
Linda Morrison brings the voices and issues of a little-known, complex social movement to the attention of sociologists, mental health professionals, and the general public. The members of this social movement work
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an
5% OFF
Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.