Computer networking & communications books

35135 books were found.

Wazuh for Enterprise Threat Detection: Designing Scalable Detection Pipelines for Modern SOC Environments

Wazuh for Enterprise Threat Detection: Designing Scalable...

Author: Nathaniel Crowther
ISBN: 9798195106874
Format: Paperback
$63.36

You are already collecting the data. You already have the alerts. Your dashboard already looks ""secure."" And yet...  Read More >>

Advanced Kubernetes Security: Policy Enforcement via Admission Controllers

Advanced Kubernetes Security: Policy Enforcement via...

Author: Willie H Ryan
ISBN: 9798195119591
Format: Paperback
$66.00

Imagine it's 3:00 AM. Your pager screams. A junior developer accidentally deployed a web container running as the...  Read More >>

Reti Informatiche

Reti Informatiche

Author: MR A Mohaideen ,  Mr S Vinayagan
ISBN: 9786209967788
Format: Paperback
$271.92

Il libro Reti di computer fornisce un'introduzione completa ai concetti e ai principi della comunicazione dati e...  Read More >>

Google Cloud DevOps Engineer: Tools & Labs: Designing, Operating, and Evolving Production-Grade Systems in the Real World

Google Cloud DevOps Engineer: Tools & Labs: Designing,...

Author: Mohan Rayithi
ISBN: 9798259492141
Format: Paperback
$65.97

This is not a DevOps book. It's a reality check. Google Cloud DevOps Engineer: Tools & Labs takes you beyond tutorials,...  Read More >>

Redes Informáticas

Redes Informáticas

Author: MR A Mohaideen ,  Mr S Vinayagan
ISBN: 9786209829659
Format: Paperback
$271.92

O livro Redes de Computadores oferece uma introdução abrangente aos conceitos e princípios da comunicação de dados...  Read More >>

Computernetze

Computernetze

Author: MR A Mohaideen ,  Mr S Vinayagan
ISBN: 9786209854538
Format: Paperback
$271.92

Das Buch Computernetzwerke bietet eine umfassende Einführung in die Konzepte und Prinzipien der Datenkommunikation...  Read More >>

Linux Performance: A Practical Guide to Linux Performance Engineering

Linux Performance: A Practical Guide to Linux Performance...

Author: Eslam Wahba
ISBN: 9798195083151
Format: Paperback
$26.37

Optimize Linux performance for high-scale, production-grade systems. Linux Performance: A Practical Guide to Linux...  Read More >>

Wykrywanie zasobów: wykorzystanie ruchu sieciowego do oszacowania obciążenia procesora i pamięci

Wykrywanie zasobów: wykorzystanie ruchu sieciowego do...

Author: Lanier Watkins
ISBN: 9786209953149
Format: Paperback
$150.48

Twierdzimy, że siec stanowi w rzeczywistości przedlużenie jednostki systemowej; w związku z tym powinniśmy byc w...  Read More >>

Linux Mint 22.3 Zena User Guide for Beginners 2026: Step-by-Step Manual to Set Up, Personalize Your Desktop, and Master Core Tools with Ease

Linux Mint 22.3 Zena User Guide for Beginners 2026:...

Author: Samuel T Techwell
ISBN: 9798259443891
Format: Paperback
$46.20

This book is not affiliated with, endorsed by, sponsored by, or connected to the Linux Mint Team or Linux Mint project....  Read More >>

Mastering Claude Mythos: An Advanced Guide to AI-Powered Cybersecurity and Autonomous Vulnerability Discovery

Mastering Claude Mythos: An Advanced Guide to AI-Powered...

Author: Kevlin Henney
ISBN: 9798259445796
Format: Paperback
$42.21

Independent Publication. Not affiliated with or endorsed by Anthropic, PBC. The era of reactive cybersecurity is...  Read More >>

Autonomous Cyber Defense: Building the AI-Driven SOC (Volume-I): Why Human-Led Security Fails and How Intelligent Systems Take Over

Autonomous Cyber Defense: Building the AI-Driven SOC...

Author: Sanzaya Patel
ISBN: 9798259339866
Format: Paperback
$131.97

Autonomous Cyber Defense - Volume I Why Human-Led Security Fails and How Intelligent Systems Take Over Cybersecurity...  Read More >>

CSPM Mastery: Building Open-Source Cloud Security Posture Management to End Misconfigurations.

CSPM Mastery: Building Open-Source Cloud Security Posture...

Author: Albert V Chitwood
ISBN: 9798259352711
Format: Paperback
$72.73

Stop Paying for Black-Box Security. Build the Ultimate Open-Source Cloud Security Posture Management (CSPM) System....  Read More >>

Autonomous Cyber Defense: Building the AI-Driven SOC (Volume-III): Real-World Systems, Alignment & Future Warfare

Autonomous Cyber Defense: Building the AI-Driven SOC...

Author: Sanzaya Patel
ISBN: 9798259346185
Format: Paperback
$158.37

Autonomous Cyber Defense - Volume III Building, Deploying, and Governing AI-Driven Security Systems Designing intelligent...  Read More >>

Grundlagen der Plattformentwicklung: Goldene Pfade, Vorlagen und DX im großen Maßstab

Grundlagen der Plattformentwicklung: Goldene Pfade,...

Author: Amara Hawthorn
ISBN: 9798259349360
Format: Paperback
$58.74

Grundlagen der Plattformentwicklung - Goldene Pfade, Vorlagen und DX im großen Maßstab ist der praxisnahe Leitfaden...  Read More >>

Deep Learning Architectures for Embedded Communication and IoT Systems: Structured Data Exchange Mechanisms Across Compact Processing Units

Deep Learning Architectures for Embedded Communication...

Author: Ian D Ravenscroft
ISBN: 9798259362116
Format: Paperback
$60.69

Are you ready to step into a world where tiny devices don't just collect data-but actually think? Where your embedded...  Read More >>

No Security Background Required: A Plain-English Guide to Using Claude Mythos for Software Vulnerability Detection

No Security Background Required: A Plain-English Guide...

Author: Kevlin Henney
ISBN: 9798259405639
Format: Paperback
$42.21

Independent Publication. Not affiliated with or endorsed by Anthropic, PBC. Security was never supposed to be this...  Read More >>

Deploying Claude Mythos in the Enterprise: A CTO's Guide to AI-Powered Security Integration

Deploying Claude Mythos in the Enterprise: A CTO's Guide...

Author: Kevlin Henney
ISBN: 9798259408074
Format: Paperback
$42.21

Independent Publication. Not affiliated with or endorsed by Anthropic, PBC. The threat landscape did not gradually...  Read More >>

The Everyday Developer's Guide to Claude Mythos: Using AI to Detect and Fix Software Vulnerabilities

The Everyday Developer's Guide to Claude Mythos: Using...

Author: Kevlin Henney
ISBN: 9798259410558
Format: Paperback
$47.49

Independent Publication. Not affiliated with or endorsed by Anthropic, PBC. There is a vulnerability in your code....  Read More >>

Claude Mythos Mastery: Building AI-Powered Security Workflows for Independent Developers

Claude Mythos Mastery: Building AI-Powered Security...

Author: Kevlin Henney
ISBN: 9798259425187
Format: Paperback
$42.21

Independent Publication. Not affiliated with or endorsed by Anthropic, PBC. Most developers wait until something...  Read More >>

Microsoft Cybersecurity Architect SC-100 Exam Guide: Design and implement secure solutions for the SC-100 exam (English Edition)

Microsoft Cybersecurity Architect SC-100 Exam Guide:...

Author: Steve Miles
ISBN: 9789365897197
Format: Paperback
$105.47

Microsoft security is the essential foundation for protecting modern businesses, and mastering its architecture...  Read More >>

Ressourcenerkennung: Ableitung der CPU- und Speicherauslastung anhand des Netzwerkverkehrs

Ressourcenerkennung: Ableitung der CPU- und Speicherauslastung...

Author: Lanier Watkins
ISBN: 9786209823251
Format: Paperback
$150.48

Wir vertreten die Auffassung, dass das Netzwerk eigentlich eine Erweiterung der Systemeinheit darstellt; daher sollten...  Read More >>

Detecção de recursos: utilização do tráfego de rede para inferir a carga da CPU e da memória

Detecção de recursos: utilização do tráfego de rede...

Author: Lanier Watkins
ISBN: 9786209823473
Format: Paperback
$150.48

Defendemos que a rede é, na verdade, uma extensão da unidade central; por isso, deveríamos poder utilizar o tráfego...  Read More >>

Détection des ressources: utilisation du trafic réseau pour estimer la charge du processeur et de la mémoire

Détection des ressources: utilisation du trafic réseau...

Author: Lanier Watkins
ISBN: 9786209871313
Format: Paperback
$150.48

Nous soutenons que le réseau constitue en réalité une extension de l'unité centrale; par conséquent, nous devrions...  Read More >>

Individuazione delle risorse: utilizzo del traffico di rete per dedurre il carico della CPU e della memoria

Individuazione delle risorse: utilizzo del traffico...

Author: Lanier Watkins
ISBN: 9786209899317
Format: Paperback
$150.48

Riteniamo che la rete sia di fatto un'estensione dell'unità di sistema; pertanto, dovremmo essere in grado di utilizzare...  Read More >>

Embedded Linux Based IoT Systems Design, Develop, and Deploy Connected Devices

Embedded Linux Based IoT Systems Design, Develop, and...

Author: Dr Hamdane Bensenane ,  Pr Abdellatif Rahmoun
ISBN: 9798899664458
Format: Paperback
$100.32

The book is designed for intermediate computer science Bachelor students. It covers some of the most important concepts...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List