0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R4,120 Discovery Miles 41 200 Ships in 10 - 15 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R6,046 Discovery Miles 60 460 Ships in 10 - 15 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Big Data Applications in the Telecommunications Industry (Hardcover): Ye Ouyang, Mantian Hu Big Data Applications in the Telecommunications Industry (Hardcover)
Ye Ouyang, Mantian Hu
R3,968 Discovery Miles 39 680 Ships in 10 - 15 working days

The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data

Stereoscopic Image Quality Assessment (Hardcover, 1st ed. 2020): Yong Ding, Guangming Sun Stereoscopic Image Quality Assessment (Hardcover, 1st ed. 2020)
Yong Ding, Guangming Sun
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book provides a comprehensive review of all aspects relating to visual quality assessment for stereoscopic images, including statistical mathematics, stereo vision and deep learning. It covers the fundamentals of stereoscopic image quality assessment (SIQA), the relevant engineering problems and research significance, and also offers an overview of the significant advances in visual quality assessment for stereoscopic images, discussing and analyzing the current state-of-the-art in SIQA algorithms, the latest challenges and research directions as well as novel models and paradigms. In addition, a large number of vivid figures and formulas help readers gain a deeper understanding of the foundation and new applications of objective stereoscopic image quality assessment technologies. Reviewing the latest advances, challenges and trends in stereoscopic image quality assessment, this book is a valuable resource for researchers, engineers and graduate students working in related fields, including imaging, displaying and image processing, especially those interested in SIQA research.

Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019): Christoforos Kachris, Babak Falsafi, Dimitrios Soudris Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019)
Christoforos Kachris, Babak Falsafi, Dimitrios Soudris
R4,132 Discovery Miles 41 320 Ships in 10 - 15 working days

This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.

Information Systems and Technology for Organizations in a Networked Society (Hardcover, New): Tomayess Issa, Pedro Isaias, Piet... Information Systems and Technology for Organizations in a Networked Society (Hardcover, New)
Tomayess Issa, Pedro Isaias, Piet Kommers
R5,134 Discovery Miles 51 340 Ships in 10 - 15 working days

Modern society is increasingly information-driven, relying heavily on Information Systems (IS) and Information Technology (IT). Business enterprises are no exception, and managers and leaders must learn to make the most of the information resources at their disposal or risk falling behind the times. Information Systems and Technology for Organizations in a Networked Society discusses methods of using information technologies to support organizational and business objectives in both national and international contexts. This reference book describes the latest research on both the technical and non-technical aspects of contemporary information societies, including e-commerce, e-learning, e-government, and e-health; supporting professionals and academicians in developing a deeper understanding of the most effective models for communication, collaboration, and business development. This book is part of the Advances in Business Information Systems and Analytics series collection.

Blockchain Technology: Platforms, Tools and Use Cases, Volume 111 (Hardcover): Pethuru Raj, Ganesh Chandra Deka Blockchain Technology: Platforms, Tools and Use Cases, Volume 111 (Hardcover)
Pethuru Raj, Ganesh Chandra Deka
R4,474 Discovery Miles 44 740 Ships in 12 - 19 working days

Blockchain Technology: Platforms, Tools and Use Cases, Volume 111, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. This volume has 8 Chapters that discuss the various aspects of Blockchain technology.

VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019): Shojiro Asai VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019)
Shojiro Asai
R6,506 Discovery Miles 65 060 Ships in 10 - 15 working days

This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,955 Discovery Miles 29 550 Ships in 10 - 15 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.): Kieran McCorry,... Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.)
Kieran McCorry, Donald Livengood
R1,653 Discovery Miles 16 530 Ships in 12 - 19 working days

Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios.
McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Detailed explanations of Active Directory integration with Exchange 2000, migration to Exchange 2000 from another system and Exchange 2000 transport, connectivity, and tools
Gives readers the benefit of authors' extensive experience
Unique description of the software "plumbing" organizations must master to move to Exchange 2000

Distributed Systems - International Edition (Paperback, 5th edition): George Coulouris, Jean Dollimore, Tim Kindberg, Gordon... Distributed Systems - International Edition (Paperback, 5th edition)
George Coulouris, Jean Dollimore, Tim Kindberg, Gordon Blair
R2,727 Discovery Miles 27 270 Ships in 12 - 19 working days

Broad and up-to-date coverage of the principles and practice in the fast moving area of Distributed Systems. Distributed Systems provides students of computer science and engineering with the skills they will need to design and maintain software for distributed applications. It will also be invaluable to software engineers and systems designers wishing to understand new and future developments in the field. From mobile phones to the Internet, our lives depend increasingly on distributed systems linking computers and other devices together in a seamless and transparent way. The fifth edition of this best-selling text continues to provide a comprehensive source of material on the principles and practice of distributed computer systems and the exciting new developments based on them, using a wealth of modern case studies to illustrate their design and development. The depth of coverage will enable students to evaluate existing distributed systems and design new ones.

Low-overhead Communications in IoT Networks - Structured Signal Processing Approaches (Hardcover, 1st ed. 2020): Yuanming Shi,... Low-overhead Communications in IoT Networks - Structured Signal Processing Approaches (Hardcover, 1st ed. 2020)
Yuanming Shi, Jialin Dong, Jun Zhang
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

The recent developments in wireless communications, networking, and embedded systems have driven various innovative Internet of Things (IoT) applications, e.g., smart cities, mobile healthcare, autonomous driving and drones. A common feature of these applications is the stringent requirements for low-latency communications. Considering the typical small payload size of IoT applications, it is of critical importance to reduce the size of the overhead message, e.g., identification information, pilot symbols for channel estimation, and control data. Such low-overhead communications also help to improve the energy efficiency of IoT devices. Recently, structured signal processing techniques have been introduced and developed to reduce the overheads for key design problems in IoT networks, such as channel estimation, device identification, and message decoding. By utilizing underlying system structures, including sparsity and low rank, these methods can achieve significant performance gains. This book provides an overview of four general structured signal processing models: a sparse linear model, a blind demixing model, a sparse blind demixing model, and a shuffled linear model, and discusses their applications in enabling low-overhead communications in IoT networks. Further, it presents practical algorithms based on both convex and nonconvex optimization approaches, as well as theoretical analyses that use various mathematical tools.

Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019): Sebastien Ziegler Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019)
Sebastien Ziegler
R4,924 Discovery Miles 49 240 Ships in 12 - 19 working days

This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,880 Discovery Miles 58 800 Ships in 10 - 15 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,819 Discovery Miles 58 190 Ships in 10 - 15 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Information Security in Diverse Computing Environments (Hardcover): Anne V. D. M. Kayem, Christoph Meinel Information Security in Diverse Computing Environments (Hardcover)
Anne V. D. M. Kayem, Christoph Meinel
R6,667 Discovery Miles 66 670 Ships in 10 - 15 working days

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Distributed Systems: Principles and Paradigms - Pearson New International Edition (Paperback, 2nd edition): Andrew Tanenbaum,... Distributed Systems: Principles and Paradigms - Pearson New International Edition (Paperback, 2nd edition)
Andrew Tanenbaum, Maarten Van Steen
R2,570 Discovery Miles 25 700 Ships in 12 - 19 working days

For courses on Distributed Systems, Distributed Operating Systems, and Advanced Operating Systems focusing on distributed systems, found in departments of Computer Science, Computer Engineering and Electrical Engineering. Very few textbooks today explore distributed systems in a manner appropriate for university students. In this unique text, esteemed authors Tanenbaum and van Steen provide full coverage of the field in a systematic way that can be readily used for teaching. No other text examines the underlying principles - and their applications to a wide variety of practical distributed systems - with this level of depth and clarity.

The Age of You - How to Understand and Benefit from Social Media and the Connected Society (Hardcover): Stein Arne Nistad The Age of You - How to Understand and Benefit from Social Media and the Connected Society (Hardcover)
Stein Arne Nistad
R798 Discovery Miles 7 980 Ships in 12 - 19 working days

"The age of You" is about our new society and how we all breaks away from established rules about communication, relationships and the way we do business. Its also the history about a major shift: Increasingly, we take control over our personal and commercial relationships, we decide who we want to listen to, and how we want to engage ourselves. The book is explaining the historical development, concepts and the foundation of networks, relations, social media and the new connected society, as well as practical strategic guidelines to benefit from it. By using historical events, storytelling, models and case studies, the book is a thrilling story about YOU and how to succeed in the connected society. Storytelling in a connected society unlocks the need for new models and approaches. Here, the author gives us a deeper understanding of the challenges ahead and what we need to do to effectively connect with and earn relevance within society. Brian Solis, author of What's the Future of Business Really interesting. There is a major need for this type of literature. Anne Grethe Solberg, Sociologist and Doctor PH. D. The last year I have read almost everything about the subject. This is by far the best book on social media. Inger Line Skjerve, Master student (BI):

Amazon Redshift Database Developer Guide (Hardcover): Documentation Team Amazon Redshift Database Developer Guide (Hardcover)
Documentation Team
R3,207 Discovery Miles 32 070 Ships in 10 - 15 working days
Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover): Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover)
R5,066 Discovery Miles 50 660 Ships in 10 - 15 working days

Wireless networking is considered by many to be the future of communication technology, as the demand for high quality, mobile connection increases across the world. Wireless Network Traffic and Quality of Service Support: Trends and Standards examines cutting edge approaches for the provision of Quality of Service (QoS) in wireless local area networks, presenting the latest solutions towards the optimization of the channel management and routing in infrastructure and ad hoc wireless networks. This book also analyzes traffic categorization issues and methods that can predict the available QoS, as well as managing wireless mesh networks and wireless sensor networks. It also examines the entire user experience, by treating energy conservation techniques to maximize mobile devices' battery lifetime. It is a vital foundation for researchers dealing with the problems of today to create the new networks of the future.

Convergence of ICT and Smart Devices for Emerging Applications (Hardcover, 1st ed. 2020): Sara Paiva, Suman Paul Convergence of ICT and Smart Devices for Emerging Applications (Hardcover, 1st ed. 2020)
Sara Paiva, Suman Paul
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book focuses on recent topics related to the convergence of information and communication technologies (ICT) and computing with smart devices. Domain areas of application include social, industrial, business development, and day to day life aspects. This book presents chapters related to the aforementioned topics including case studies showcasing future technological trends and challenges. Topics social inclusion solutions and social changes; smart devices and applications for day to day life; smart IoT and applications; and smart cities solutions. The book is applicable to researchers, students, professionals, and professors in a wide range of fields. Focuses on recent developments in ICT and smart devices that pose a clear benefit for users; Presents applications of ICT in education, health, electronics, communication, networking, computing, tourism, transportation; Appeals to researchers, academics, and professionals in a cross section of disciplines.

Mobile Information Service for Networks (Hardcover, 1st ed. 2020): Changjun Jiang, Zhong Li Mobile Information Service for Networks (Hardcover, 1st ed. 2020)
Changjun Jiang, Zhong Li
R2,892 Discovery Miles 28 920 Ships in 10 - 15 working days

This book introduces readers to mobile information services for networks. The content is divided into eight chapters, each of which presents a specific concept and the latest related developments in mobile information services. Mobile information services for networks can be defined as platform-independent functional entities that provide various services based on the communication network platform. The book discusses the three main supporting technologies for mobile information services: neighbor discovery in the data link layer; routing and balanced association in the network layer; and community structure detection in the application layer. Lastly, the book describes the development of applications based on the authors' mobile information service platform, as well as related key technologies in the domains of intelligent transportation, smart tourism, and mobile payment, such as trajectory analysis, location recommendation, and mobile behavior authentication, which are promoting the development of mobile information services. This book offers a valuable reference guide for researchers in the field of computer science and technology, as well as those in the field of network mobile information service technology.

Cybersecurity Measures for E-Government Frameworks (Hardcover): Noor Zaman, Imdad Ali Shah, Samina Rajper Cybersecurity Measures for E-Government Frameworks (Hardcover)
Noor Zaman, Imdad Ali Shah, Samina Rajper
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.

Full-Duplex Communications for Future Wireless Networks (Hardcover, 1st ed. 2020): Hirley Alves, Taneli Riihonen, Himal A... Full-Duplex Communications for Future Wireless Networks (Hardcover, 1st ed. 2020)
Hirley Alves, Taneli Riihonen, Himal A Suraweera
R2,915 Discovery Miles 29 150 Ships in 10 - 15 working days

This book focuses on the multidisciplinary state-of-the-art of full-duplex wireless communications and applications. Moreover, this book contributes with an overview of the fundamentals of full-duplex communications, and introduces the most recent advances in self-interference cancellation from antenna design to digital domain. Moreover, the reader will discover analytical and empirical models to deal with residual self-interference and to assess its effects in various scenarios and applications. Therefore, this is a highly informative and carefully presented book by the leading scientists in the area, providing a comprehensive overview of full-duplex technology from the perspective of various researchers, and research groups worldwide. This book is designed for researchers and professionals working in wireless communications and engineers willing to understand the challenges and solutions full-duplex communication so to implement a full-duplex system.

Mission-Critical Microsoft Exchange 2000 - Building Highly-Available Messaging and Knowledge Management Systems (Paperback):... Mission-Critical Microsoft Exchange 2000 - Building Highly-Available Messaging and Knowledge Management Systems (Paperback)
Jerry Cochran
R1,548 Discovery Miles 15 480 Ships in 12 - 19 working days

Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous and incredibly valuable.
Mission-Critical Microsoft Exchange 2000 teaches system designers, administrators and developers the strategies, tools, and best practices they'll need to plan and implement highly-available systems on Exchange 2000 and on earlier versions of Exchange. The book explains Exchange back-up and disaster recovery techniques, Windows clustering technologies for Exchange systems, and security planning to resist messaging-based attacks. Written by Jerry Cochran, an authority on large-scale Exchange systems, Mission-Critical Microsoft Exchange 2000 helps readers create Exchange systems upon which they can build large and growing organizations.
Unique book on a crucial Exchange topic
Part of Digital Press's Exchange Server Cluster
Author is Compaq's expert on high-end Exchange systems

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hands-on Matrix Algebra Using R: Active…
Hrishikesh D Vinod Hardcover R2,890 Discovery Miles 28 900
R for SAS and SPSS Users
Robert A. Muenchen Hardcover R4,659 Discovery Miles 46 590
A Level of Martin-Lof Randomness
Bradley S. Tice Hardcover R3,414 Discovery Miles 34 140
Applied Probability - From Random…
Valerie Girardin, Nikolaos Limnios Hardcover R2,284 Discovery Miles 22 840
Mathematics for Computer Science
Eric Lehman, F.Thomson Leighton, … Hardcover R1,660 Discovery Miles 16 600
Engineering Production-Grade Shiny Apps
Colin Fay, Sebastien Rochette, … Paperback R1,693 Discovery Miles 16 930
A Simple Guide to SPSS (R) for Political…
Lee Kirkpatrick, Quentin Kidd Paperback R1,285 R1,189 Discovery Miles 11 890
Visual Approach to SPSS for Windows, A…
Leonard Stern Paperback R2,157 Discovery Miles 21 570
Linear Algebra with Mathematica - An…
Fred Szabo Paperback R2,175 Discovery Miles 21 750
Statistical Trend Analysis of Physically…
Behrouz Zolfaghari, Khodakhast Bibak, … Hardcover R1,605 Discovery Miles 16 050

 

Partners