MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Articles

1 254 products

Advertisement

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and
📱 Networking
This work studies the development of bilateral relations in two pairs of states (dyads): Argentina-Brazil and Argentina-Chile. It takes on a moderate constructivist approach that incorporates into the analysis of international relations
📱 Networking
18% OFF
Papers collected here, from a December 2001 workshop held at the University of Central Florida, examine topics related to process coordination and ubiquitous computing. Papers on coordination models discuss areas such as
📱 Networking
As we begin a new century, the astonishing spread of nationally and internationally accessible computer-based communication networks has touched the imagination of people everywhere. Suddenly, the Internet is in everyday parlance, featured
📱 Networking
Protect your organisation by building a security-minded culture With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a
📱 Networking
20% OFF
The diversity of methodologies and applications in the literature for the traffic engineering, performance modelling and analysis of convergent multiservice heterogeneous networks attests to the breath and richness of recent research and
📱 Networking
20% OFF
Over the recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of convergent multi-service heterogeneous networks, such as wireless
📱 Networking
21% OFF
Implement a Hyper-V virtualization solution Microsoft Virtualization with Hyper-V shows you how to deploy Microsoft's next-generation hypervisor-based server virtualization technology in a corporate environment. You'll get step-by-step guidelines for getting Hyper-V up
📱 Networking
Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can
📱 Networking
Providing a comprehensive set of business models for an e-business, this book enables IT managers and directors to develop and implement IT strategies and infrastructures for new models of doing business based
📱 Networking
Linda Morrison brings the voices and issues of a little-known, complex social movement to the attention of sociologists, mental health professionals, and the general public. The members of this social movement work
📱 Networking
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future
📱 Networking
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an
📱 Networking
5% OFF
Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery
📱 Networking
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.