Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis /
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators /
Building Telephony Systems with OpenSIPS - Second Edition.
Virtualized software-defined networks and services /
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data /
Cisco ACI cookbook : accelerating application deployment and IT processes /
Computer network /
Learning Karaf Cellar.
Network quality of service /
Algorithms and architectures /
Toward a national research network /
Infrastructure as code (IAC) cookbook : over 90 practical, actionable recipes to automate, test and manage your infrastructure quickly and effectively /
Okta Administration : Implement Enterprise-Grade Identity and Access Management for on-premises and Cloud Apps.
Mastering NGINX : an in-depth guide to configuring NGINX for your everyday server needs /
Computer networks and communications /
Internet of things : emergence, perspectives, privacy and security issues /
Trapped in the net : the unanticipated consequences of computerization /
Computer and information sciences : 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27-28, 2016, Proceedings /
Digital diaspora : a race for cyberspace /
Microsoft Power BI quick start guide : build dashboards and visualizations to make your data come to life /
Steps in Scala : an introduction to object-functional programming /
Computing tomorrow : future research directions in computer science /
Persuasive technology : using computers to change what we think and do /
Learn Robotics Programming : Build and Control Autonomous Robots Using Raspberry Pi 3 and Python.
Computer-mediated communication : linguistic, social, and cross-cultural perspectives /
Mastering machine learning algorithms : expert techniques to implement popular machine learning algorithms and fine-tune your models /
RUST WEB PROGRAMMING : a hands-on guide to developing fast and secure web apps with the ... rust programming language.
After digital : computation as done by brains and machines /
Representation and reality /
Strategic negotiation in multiagent environments /
Mastering Python for finance : implement advanced state-of-the-art financial statistical applications using Python /
Hands-on cloud-native applications with java and quarkus;build high performance, kubernetes-native java serverless applications
Applied data visualization with R and ggplot2 : Create useful, elaborate, and visually appealing plots /
Machine Learning Algorithms : Popular Algorithms for Data Science and Machine Learning, 2nd Edition.
Attribute-Based Access Control.
Architecting Angular Applications with Redux, RxJS, and NgRx : Learn to build Redux style high-performing applications with Angular 6.
The digitally disposed : racial capitalism and the informatics of value /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Securing the cloud : cloud computer security techniques and tactics /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Theories, Practices and Examples for Community and Social Informatics.
Managing Cisco network security /
Nokia network security : solutions handbook /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Who goes there? : authentication through the lens of privacy /
Designing and building enterprise DMZs /
Nessus network auditing /
Supercomputers : directions in technology and applications /
The national challenge in computer science and technology /
Roles of industry and the university in computer research and development : a report /