Free Delivery Over $100
6935 books were found.
This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor... Read More >>
This book provides readers with a detailed reference regarding two of the most important long-term reliability and... Read More >>
Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking,... Read More >>
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network... Read More >>
Thanks to its clear organization and meticulous presentation, this book is as an excellent basic introduction to... Read More >>
Contains an embedded Linux system development roadmap for systems architects and software programmers. Explaining... Read More >>
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build... Read More >>
Covers various aspects of Mobile Web 2.0. This book identifies the main challenges and proposes a platform architecture... Read More >>
Read More >>
Providing guidance that can be applied to enterprises of different scales, this book supplies IT practitioners with... Read More >>
Widespread availability of pervasive and mobile devices coupled with advances in networking technologies make opportunistic... Read More >>
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of... Read More >>
Explores various HPC techniques in the context of remote sensing problems. This book addresses key computing concepts... Read More >>
We overspend on data center storage … yet, we fall short of business requirements. It's not about the technologies.... Read More >>
Presents an analysis of key scaling technologies. This book demonstrates the effectiveness of the technologies via... Read More >>
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications.... Read More >>
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's... Read More >>
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides... Read More >>
Describing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow... Read More >>
Offers a SWOT analysis of PSTN/GSM operators that are facing such threats as internet communities, unlicensed spectrum,... Read More >>
Offers a theoretical background to allow readers to determine when an iterative algorithm can be used. This book... Read More >>
With examples and exercises, this work develops simple models and analytical methods from first principles to evaluate... Read More >>
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the... Read More >>
Also known as WiMAX (Worldwide Interoperability for Microwave Access), IEEE 802 16 (802 16a, 802 16d, 802 16e, WiBro)-based... Read More >>
Demonstrates the design principles and techniques that enable the design of software that empowers business staff... Read More >>