Title: ENTERPRISE 2.0 IMPLEMENTATION: Integrate Web 2.0 Services into Your Enterprise, Author: Aaron Newman
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Connectivity Prediction in Mobile Ad Hoc Networks for Real-Time Control, Author: Sebastian Thelen
Title: SDN: Software Defined Networks: An Authoritative Review of Network Programmability Technologies, Author: Thomas D. Nadeau
Title: Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations, Author: Peter Southwick
Title: Cloud Native Data Center Networking: Architecture, Protocols, and Tools, Author: Dinesh G. Dutt
Title: Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam, Author: Gary A. Donahue
Title: Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles, Author: Mark Buckwell
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: Network Security Through Data Analysis: From Data to Action, Author: Michael Collins
Title: Juniper QFX10000 Series: A Comprehensive Guide to Building Next-Generation Data Centers, Author: Jr. Douglas Richard Hanks
Title: Perpetual Contact: Mobile Communication, Private Talk, Public Performance, Author: James E. Katz
Title: Community Media: People, Places, and Communication Technologies, Author: Kevin Howley
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: IT Project Management: On Track from Start to Finish, Third Edition, Author: Joseph Phillips
Title: Secure and Smart Internet of Things (IoT): Using Blockchain and AI, Author: Ahmed Banafa
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: Business Intelligence: The Savvy Manager's Guide, Author: David Loshin
Title: Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices, Author: Andrew Hay
Title: Ethereal Packet Sniffing, Author: Syngress

Pagination Links