Quantum computing is a field in which advanced technologies like quantum communication, artificial intelligence and machine learning can be used …
Whether you are an executive or sales manager in a networking company, a data communications engineer, or a telecommunications professional, …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
What's happening to the business of television? Television Disrupted: The Transition from Network to Networked Television will empower you to …
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products …
vCenter Operations Manager offers a powerful solution to administrating a large virtual machine deployment, allowing you to automate processes and …
Leverage the power of Python, Ansible and other network automation tools to make your network robust and more secure Key …
This book provides a comprehensive learning journey aimed at helping you master Ansible and efficiently automate a range of enterprise …
Conquer the Network Maze: Unleash Agility and Efficiency with Network Programmability and Automation with Python Drowning in a sea of …
Network Programming with Go teaches you how to write clean, secure network software with the programming language designed to make …
Linux is everywhere. Whether you run a home office, a small business, or manage enterprise systems, Linux can empower your …
The Laboratory Manual is a valuable tool designed to enhance your lab experience. Lab activities, objectives, materials lists, step-by-step procedures, …
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, …
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the …
Learn 5G network design and implement advanced apps using standalone, non-standalone, and private 5G networks with expert guidance from industry …
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive …
Prepare for CompTIA A+ 220-801 and 220-802 exam success with this CompTIA Approved Exam Cram from Pearson IT Certification, a …
Gephi is an interactive visualization and exploration platform for all kinds of networks and complex systems. Social media data has …
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentialsprovides a comprehensive introduction to the field, with expert coverage of essential …
Exploring the major features and packages of Go, along with its types and data-structures, enabling the reader to write threadsafe, …
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips …
Cell phones have changed the way people live, work, and communicate with each other. Since the first handheld phone was …
This book constitutes the refereed proceedings of the 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, held in Beijing, …
Citrix MetaFrame XP is designed for scalable server farms. It is capable of load balancing user sessions across multiple servers …
This monograph provides and explains the mathematics behind geometric graph theory, which studies the properties of a graph that consists …
The book is devoted to the study of classical combinatorial structures such as random graphs, permutations, and systems of random …
This clearly written, mathematically rigorous text includes a novel algorithmic exposition of the simplex method and also discusses the Soviet …
Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network …