• 0 Items - £0.00
    • No products in the cart.

Computer Systems Organization

9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Biometric Security

Edited By: Jiankun Hu, David Chek Ling Ngo, Andrew Beng Jin Teoh
£57.99
Biometric systems hide many pitfalls that can lead to major security weaknesses and privacy threats. This book showcases a collection of comprehensive references from eminent researchers, providing concise coverage of state-of-the-art solutions.

Biometric systems hide many pitfalls that can lead to major security weaknesses and privacy threats. This book showcases a collection of comprehensive references from eminent researchers, providing concise coverage of state-of-the-art solutions.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Digital Platformization and Effects on Corporate Branding

European Sports and Cultural Networks
By: Genni Perlangeli
£59.99
This book reflects on digital platforms, their added value for sustainability through corporate branding, and the challenge of assessing performance in the sports, cultural, and creative sectors as platform-based models become embedded in everyday life.

This book reflects on digital platforms, their added value for sustainability through corporate branding, and the challenge of assessing performance in the sports, cultural, and creative sectors as platform-based models become embedded in everyday life.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page
£58.99
In dynamic ad-hoc networks, link failures lead to unreliable and inefficient data transmission. This work proposes LR-EE-AOMDV, a novel extension of the AOMDV routing protocol, to find multiple link-reliable, energy-efficient paths for robust data transmission.

In dynamic ad-hoc networks, link failures lead to unreliable and inefficient data transmission. This work proposes LR-EE-AOMDV, a novel extension of the AOMDV routing protocol, to find multiple link-reliable, energy-efficient paths for robust data transmission.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page
From £29.99
A virtual honeypot detects threats from hackers and captures data about their attacks. This book details how to confuse attackers and direct them onto the wrong path.

A virtual honeypot detects threats from hackers and captures data about their attacks. This book details how to confuse attackers and direct them onto the wrong path.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

European Research Activities in Cloud Computing

Edited By: Dana Petcu, José Luis Vázquez-Poletti
£44.99
For students, researchers, and developers, this book offers a snapshot of ongoing European research and development in cloud computing. It covers the latest hot topics, including services, management, automation, and adoption.

For students, researchers, and developers, this book offers a snapshot of ongoing European research and development in cloud computing. It covers the latest hot topics, including services, management, automation, and adoption.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page
From £29.99
This book provides a fresh look at the evolution of mobility management for next generation networks. It goes beyond traditional, centralized approaches, offering insights into practical ways of distributing mobility management for operators and end-users.

This book provides a fresh look at the evolution of mobility management for next generation networks. It goes beyond traditional, centralized approaches, offering insights into practical ways of distributing mobility management for operators and end-users.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Information Security in Education and Practice

Edited By: Kalinka Kaloyanova
From £29.99
The growth of cybersecurity issues affects us all. This book addresses current challenges in information security for a wide range of users, from governments to students, discussing topics like educational frameworks and applications of security principles in specific domains.

The growth of cybersecurity issues affects us all. This book addresses current challenges in information security for a wide range of users, from governments to students, discussing topics like educational frameworks and applications of security principles in specific domains.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Second Generation Mainframes

The IBM 7000 Series
By: Stephen H. Kaisler
From £34.99
The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. This study describes IBM’s second generation of mainframe computers, detailing their new technology, new peripherals and advanced software.

The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. This study describes IBM’s second generation of mainframe computers, detailing their new technology, new peripherals and advanced software.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Selected Readings in Cybersecurity

Edited By: Young B. Choi
£68.99
This book highlights the current state of the art of cybersecurity, covering key areas from systems design and management to emerging technology trends. It will appeal to practitioners, faculty, and students in cybersecurity, information technology, and computer science.

This book highlights the current state of the art of cybersecurity, covering key areas from systems design and management to emerging technology trends. It will appeal to practitioners, faculty, and students in cybersecurity, information technology, and computer science.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

The Evolution of the Net

Networked Infrastructure from Telephony to Telesophy
By: Bruce R. Schatz
From £36.99
This book describes the evolution of the Net for nonspecialists. It explains the infrastructure’s journey from the network transmission of Telephony, the medium of the 20th century, to the knowledge navigation of Telesophy, the future medium for moving from data to wisdom.

This book describes the evolution of the Net for nonspecialists. It explains the infrastructure’s journey from the network transmission of Telephony, the medium of the 20th century, to the knowledge navigation of Telesophy, the future medium for moving from data to wisdom.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Trusted Routing Mechanisms

The Design and Requirements Analysis
By: Osuolale A. Tiamiyu
£62.99
As our business and private lives rely on computing systems, digital security is imperative. This book offers solutions that ensure the integrity and confidentiality of network traffic by protecting data from third parties.

As our business and private lives rely on computing systems, digital security is imperative. This book offers solutions that ensure the integrity and confidentiality of network traffic by protecting data from third parties.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page
£39.99
Identity theft is a growing concern in mobile ad-hoc networks. This book presents an innovative framework for identity management that puts users back in control. Using context-awareness and user-centricity, it protects identity and balances privacy with convenience.

Identity theft is a growing concern in mobile ad-hoc networks. This book presents an innovative framework for identity management that puts users back in control. Using context-awareness and user-centricity, it protects identity and balances privacy with convenience.

View more This product has multiple variants. The options may be chosen on the product page
9781527539594-2
View more This product has multiple variants. The options may be chosen on the product page

Wireless Communication Technologies for IoT

Applications and Analysis
Edited By: Ram Krishan, Manpreet Kaur, Jaspal Singh, Jagtar Singh, Shilpa Mehta
From £35.99
The Internet of Things (IoT) uses wireless connections for real-time, data-driven decision-making. This book explores advancements in Wi-Fi, intelligent antennas, IoT-connected healthcare, smart agriculture, data analysis, energy harvesting, and smart home protocols.

The Internet of Things (IoT) uses wireless connections for real-time, data-driven decision-making. This book explores advancements in Wi-Fi, intelligent antennas, IoT-connected healthcare, smart agriculture, data analysis, energy harvesting, and smart home protocols.

View more This product has multiple variants. The options may be chosen on the product page