0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (34)
  • R500+ (372)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Master Excel - Primary Interactions with the Excel (Paperback): Thomas Clayton Master Excel - Primary Interactions with the Excel (Paperback)
Thomas Clayton
R152 Discovery Miles 1 520 Ships in 10 - 15 working days
Mastering Python Networking - Your one-stop solution to using Python for network automation, DevOps, and Test-Driven... Mastering Python Networking - Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition (Paperback, 2nd Revised edition)
Eric Chou
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

Publisher's Note: This edition from 2018 is outdated. A new third edition, updated for 2020 featuring Python 3.8, with coverage extended to include Azure, AWS, and Ansible 2.8, and data analysis using Elastic Stack has just been published. Master the art of using Python for a diverse range of network engineering tasks Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively Use Python for network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python Book DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In this second edition of Mastering Python Networking, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This book begins by reviewing the basics of Python and teaches you how Python can interact with both legacy and API-enabled network devices. As you make your way through the chapters, you will then learn to leverage high-level Python packages and frameworks to perform network engineering tasks for automation, monitoring, management, and enhanced security. In the concluding chapters, you will use Jenkins for continuous network integration as well as testing tools to verify your network. By the end of this book, you will be able to perform all networking tasks with ease using Python. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.5 using Python to control Cisco, Juniper, and Arista eAPI network devices Leverage existing frameworks to construct high-level APIs Learn how to build virtual networks in the AWS Cloud Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development Who this book is forMastering Python Networking is for network engineers and programmers who want to use Python for networking. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.

Network and Protocol Architectures for Future Satellite Systems (Paperback): Tomaso De Cola, Alberto Ginesi, Giovanni Giambene,... Network and Protocol Architectures for Future Satellite Systems (Paperback)
Tomaso De Cola, Alberto Ginesi, Giovanni Giambene, George C. Polyzos, Vasilios A. Siris
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

Since their conception satellites have offered the promise of more capacity for terrestrial communication systems or to exploit their inherent multicasting and broadcasting capabilities. Recent advances in satellite technology have resulted in the integration of satellite and terrestrial networks to meet the quality and capacity requirements of modern day communication systems. Network and Protocol Architectures for Future Satellite Systems reviews the emerging technologies being deployed in the networking architectures being proposed in the framework of the Future Internet. Novel protocols such as Multi Path TCP (MPTCP) and networking trends such as Information Centric Networking (ICN) are described in depth and their application in segments deploying both satellite and terrestrial networks are illustrated. This is also the first monograph to review content-based networking extensively. This is becoming increasingly important driven by the ubiquitous nature of the internet. Applications to satellite communications are illustrated and the technical challenges to be further addressed are highlighted.

Excel Diagrams - Complete guide on excel 2016 diagrams (Paperback): Dann Excel Diagrams - Complete guide on excel 2016 diagrams (Paperback)
Dann
R270 Discovery Miles 2 700 Ships in 10 - 15 working days
Learning Node.js Development - Learn the fundamentals of Node.js, and deploy and test Node.js applications on the web... Learning Node.js Development - Learn the fundamentals of Node.js, and deploy and test Node.js applications on the web (Paperback)
Andrew Mead
R1,219 Discovery Miles 12 190 Ships in 10 - 15 working days

A comprehensive, easy-to-follow guide to creating complete Node apps and understanding how to build, deploy, and test your own apps. Key Features Entirely project-based and practical Explains the "Why" of Node.js features, not just the "how", providing you with a deep understanding and enabling you to easily apply concepts in your own applications Covers the full range of technologies around Node.js - NPM, version control with Git, and much more Book DescriptionLearning Node.js Development is a practical, project-based book that provides you with all you need to get started as a Node.js developer. Node is a ubiquitous technology on the modern web, and an essential part of any web developers' toolkit. If you are looking to create real-world Node applications, or you want to switch careers or launch a side project to generate some extra income, then you're in the right place. This book has been written around a single goal-turning you into a professional Node developer capable of developing, testing, and deploying real-world production applications. Learning Node.js Development is built from the ground up around the latest version of Node.js (version 9.x.x). You'll be learning all the cutting-edge features available only in the latest software versions. This book cuts through the mass of information available around Node and delivers the essential skills that you need to become a Node developer. It takes you through creating complete apps and understanding how to build, deploy, and test your own Node apps. It maps out everything in a comprehensive, easy-to-follow package designed to get you up and running quickly. What you will learn Learn the fundamentals of Node Build apps that respond to user input Master working with servers Learn how to test and debug applications Deploy and update your apps in the real world Create responsive asynchronous web applications Who this book is forThis book targets anyone looking to launch their own Node applications, switch careers, or freelance as a Node developer. You should have a basic understanding of JavaScript in order to follow this course.

Cacti Beginner's Guide - (Paperback, 2nd Revised edition): Thomas Urban Cacti Beginner's Guide - (Paperback, 2nd Revised edition)
Thomas Urban
R1,256 Discovery Miles 12 560 Ships in 10 - 15 working days

A comprehensive guide to learning Cacti and using it to implement performance measurement and reporting within a Network Operations Center About This Book * A complete Cacti book that focuses on the basics as well as the advanced concepts you need to know for implementing a Network Operations Center * A step-by-step Beginner's Guide with detailed instructions on how to create and implement custom plugins * Written by Thomas Urban - creator of the "Cereus" and "NMID" plugins for Cacti known as Phalek in the Cacti forum Who This Book Is For If you are a network operator and want to use Cacti for implementing performance measurement for trending, troubleshooting, and reporting purposes, then this book is for you. You only need to know the basics of network management and SNMP. What You Will Learn * Setting up Cacti on Linux and Windows systems * Extending the core functionality by using the plugin architecture * Building your own custom plugins * Creating your own custom data input method to retrieve data from your systems * Using SNMP, SSH, and WMI to retrieve remote performance data * Designing and create enterprise-class reports with the reporting plugins * Implementing threshold-based alerting using the Thold plugin * Automating common administrative tasks utilizing the command-line interface and the automate functionality * Migrating Cacti to new servers * Building a multi remote-poller environment In Detail Cacti is a performance measurement tool that provides easy methods and functions for gathering and graphing system data. You can use Cacti to develop a robust event management system that can alert on just about anything you would like it to. But to do that, you need to gain a solid understanding of the basics of Cacti, its plugin architecture, and automation concepts. Cacti Beginner's Guide will introduce you to the wide variety of features of Cacti and will guide you on how to use them for maximum effectiveness. Advanced topics such as the plugin architecture and Cacti automation using the command-line interface will help you build a professional performance measurement system. Designed as a beginner's guide, the book starts off with the basics of installing and using Cacti, and also covers the advanced topics that will show you how to customize and extend the core Cacti functionalities. The book offers essential tutorials for creating advanced graphs and using plugins to create enterprise-class reports to show your customers and colleagues. From data templates to input methods and plugin installation to creating your own customized plugins, this book provides you with a rich selection of step-by-step instructions to reach your goals. It covers all you need to know to implement professional performance measurement techniques with Cacti and ways to fully customize Cacti to fit your needs. You will also learn how to migrate Cacti to new servers. Lastly you will also be introduced to the latest feature of building a scalable remote poller environment. By the end of the book, you will be able to implement and extend Cacti to monitor, display, and report the performance of your network exactly the way you want. Style and approach Written for beginners to Cacti, this book contains step-by-step instructions and hands-on tutorials for network operators to learn how to implement and use the core Cacti functions.

Building Bluetooth Low Energy Systems (Paperback): Muhammad Usama Bin Aftab Building Bluetooth Low Energy Systems (Paperback)
Muhammad Usama Bin Aftab
R975 Discovery Miles 9 750 Ships in 10 - 15 working days

Discover and implement a system of your choice using Bluetooth Low Energy. About This Book * Learn the basics of Bluetooth Low Energy with its exciting new protocol stack and security. * Build customized Bluetooth Low Energy projects that make your web or mobile apps smarter in terms of networking and communications. * Using Android, iOS, and the Web, acquire key skills to harness the power of Bluetooth Low Energy in your IoT applications. Who This Book Is For The book is for developers and enthusiasts who are passionate about learning Bluetooth Low Energy technologies and want to add new features and services to their new or existing products. They should be familiar with programming languages such as Swift, Java, and JavaScript. Knowledge of debugging skills would be an advantage. What You Will Learn * Bluetooth Low Energy in theory. * Bluetooth Low Energy Hardware and Software Development Kits. * Implement Bluetooth low energy communication (central and peripheral) using Android. * Master BLE Beacons with examples implemented over Eddystone and iBeacons. * Implement indoor navigation using Estimote Beacons on iOS. * Implement Internet gateways to control BLE devices on a Wi-Fi network. * Understand BLE security mechanisms with a special focus on Bluetooth pairing, bonding, and key exchange to cover encryption, privacy, and user data integrity. * Implement Bluetooth Mesh using CSRMesh Technology. In Detail Bluetooth Low Energy (BLE) is a Wireless Personal Area network technology aimed at novel applications for smart devices. High-tech BLE profiles and services are being increasingly used by application developers and hardware enthusiasts to allow devices to interact with the surrounding world. This book will focus on a technical introduction to BLE and how it is reshaping small-distance communication. We will start with IoT, where many technologies such as BLE, Zigbee, and IEEE 802.15.4 Mesh will be introduced. The book will present BLE from an engineering perspective, from which the protocol stack, architecture, and layers are discussed. You will learn to implement customized projects for Peripheral/Central communication, BLE Beacons, indoor navigation using triangulation, and the Internet gateway for Bluetooth Low Energy Personal Network, all using various code samples and APIs on Android, iOS, and the Web. Finally, the book will conclude with a glimpse into future technologies destined to be prominent in years to come. Style and approach The book is a practical tutorial that will help you understand the background and technicalities of BLE and offers a friendly environment to build and create robust BLE projects. This hands-on approach will give you a clear vision of Bluetooth Low Energy and how it can be used in IoT.

MQTT Essentials - A Lightweight IoT Protocol (Paperback): Gaston C Hillar MQTT Essentials - A Lightweight IoT Protocol (Paperback)
Gaston C Hillar
R1,268 Discovery Miles 12 680 Ships in 10 - 15 working days

Send and receive messages with the MQTT protocol for your IoT solutions. About This Book * Make your connected devices less prone to attackers by understanding practical security mechanisms * Dive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examples * Learn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examples Who This Book Is For This book is a great resource for developers who want to learn more about the MQTT protocol to apply it to their individual IoT projects. Prior knowledge of working with IoT devices is essential. What You Will Learn * Understand how MQTTv3.1 and v3.1.1 works in detail * Install and secure a Mosquitto MQTT broker by following best practices * Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate * Explore the features included in MQTT for IoT and Machine-to-Machine communications * Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js * Implement the security best practices while setting up the MQTT Mosquitto broker In Detail This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages Style and approach This step-by-step guide describes the MQTT protocol for your IoT projects

Industrial Communication Networks (Paperback): Hamed a Idowu Pmp Industrial Communication Networks (Paperback)
Hamed a Idowu Pmp
R881 Discovery Miles 8 810 Ships in 10 - 15 working days
Network Fighter (Paperback): Ervin Clane Network Fighter (Paperback)
Ervin Clane
R1,642 Discovery Miles 16 420 Ships in 10 - 15 working days
Wireless Digital Communications: Architecture, Design and Applications (Hardcover): Rafael Barrett Wireless Digital Communications: Architecture, Design and Applications (Hardcover)
Rafael Barrett
R3,210 R2,824 Discovery Miles 28 240 Save R386 (12%) Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,038 Discovery Miles 10 380 Ships in 10 - 15 working days
Opportunistic Routing in Wireless Networks (Paperback): Tara Javidi, Eric Van Buhler Opportunistic Routing in Wireless Networks (Paperback)
Tara Javidi, Eric Van Buhler
R2,217 Discovery Miles 22 170 Ships in 10 - 15 working days

Wireless multi-hop networks have become an important part of many modern communication systems. Some of the earliest examples were military communication networks utilizing wireless relays in remote areas. More recently, many industries have used wireless multi-hop networks to create a multitude of fascinating tools and systems. Motivated by classical routing solutions in the Internet, conventional routing attempts to find a fixed path along which the packets are forwarded. Such fixed path schemes fail to take advantage of the broadcast nature and opportunities provided by the wireless medium, and result in unnecessary packet retransmissions. In opportunistic routing, decisions are made in an online manner by choosing the next relay based on the actual transmission outcomes as well as a rank ordering of neighboring nodes. Opportunistic Routing in Wireless Networks provides the motivation for opportunistic routing, and presents several different algorithms which achieve better performance, in most scenarios, than conventional shortest path routing. This comprehensive survey provides a starting point for all researchers and students wishing to learn the background and technical details of opportunistic routing.

Modern Random Access Protocols (Paperback): Matteo Berioli, Giuseppe Cocco, Gianluigi Liva, Andrea Munari Modern Random Access Protocols (Paperback)
Matteo Berioli, Giuseppe Cocco, Gianluigi Liva, Andrea Munari
R2,129 Discovery Miles 21 290 Ships in 10 - 15 working days

Modern day wireless communication systems rely heavily on the random access schemes that were originally developed in the 1970s. The pioneering Aloha protocol has become a key component of many communications standards, ranging from satellite networks to ad hoc and cellular scenarios. Recent developments, however, have seen a fundamental leap forward based on using the principles of successive interference cancellation. The modern random access protocols using these new techniques have opened up a wealth of new applications. This tutorial style monograph explores the main ideas and design principles that are behind some of these novel schemes. It introduces the reader to the analytical tools used to model such performance. Focussing on slotted solutions it shows how Aloha can be combined with successive interference cancellation and optimized using the theory of codes on graphs. These techniques are illustrated in applications using physical layer network coding to resolve collisions among users and receiver diversity. It concludes by introducing the reader to the recently asynchronous (or unslotted) schemes. Modern Random Access Protocols is a comprehensive and erudite introduction to a set of techniques that will form part of many future modern communication or networked system.

Development of Configuration Software for Fieldbus Control Systems (Paperback): Geng Liang, Wen Li Development of Configuration Software for Fieldbus Control Systems (Paperback)
Geng Liang, Wen Li
R2,232 Discovery Miles 22 320 Ships in 12 - 17 working days

Since the beginning of the 1980s, configuration software has developed and evolved. It should be said that configuration software, as a kind of application software, rose with the development of personal computers. The development of configuration software is closely related to the development of the industrial control system. With the rapid development of modern industries, the production process continues to expand in scale, and its complexity is increasing. The process of industrial production is now being transformed from labour intensive, equipment intensive, and information intensive to a more knowledge intensive fashion. Configuration software as a product appeared in the early 80s, and was widely used in the late 80s. But before the mid-90s, the configuration software application was not universal. With the applications of industrial control systems widely used around the world, in the face of larger and more complex control systems, users have become gradually more aware of original host computer programming. This mode is time-consuming. The loss outweighs the gains. At the same time, MIS (management information systems) and CIMS (computer integrated manufacturing systems), and a large number of applications require an industrial site for enterprise production, management, and decision-making to provide more detailed and in-depth data in order to optimize the production and operation of enterprises in all aspects.

Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif (Paperback): Bruno Blanchet Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif (Paperback)
Bruno Blanchet
R2,130 Discovery Miles 21 300 Ships in 10 - 15 working days

The verification of security protocols has been an active research area since the 1990s. This topic is interesting for several reasons. Security protocols are ubiquitous: they are used for e-commerce, wireless networks, credit cards, e-voting, among others. The design of security protocols is notoriously error-prone. These errors can also have serious consequences. Hence, the formal verification or proof of protocols is particularly desirable. This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks. ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic primitives, defined by rewrite rules or by equations. It can prove various security properties: secrecy, authentication, and process equivalences, for an unbounded message space and an unbounded number of sessions. It takes as input a description of the protocol to verify in a dialect of the applied pi calculus, an extension of the pi calculus with cryptography. It automatically translates this protocol description into Horn clauses and determines whether the desired security properties hold by resolution on these clauses. This survey presents an overview of the research on ProVerif and is the most comprehensive text available on the topic.

CCNA Routing & Switching By Example (Paperback): M Irfan Basharat CCNA Routing & Switching By Example (Paperback)
M Irfan Basharat
R1,051 Discovery Miles 10 510 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-1) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-1) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,026 Discovery Miles 10 260 Ships in 10 - 15 working days
Hacking for Beginners - Learn basics of computer hacking in no time! (Paperback): Nicholas Brown Hacking for Beginners - Learn basics of computer hacking in no time! (Paperback)
Nicholas Brown
R268 Discovery Miles 2 680 Ships in 10 - 15 working days
Analysis & Evaluation of Communication Performance in a Real Time Industrial Fieldbus (Hardcover): Geng Liang, Wen Li, Dazhong... Analysis & Evaluation of Communication Performance in a Real Time Industrial Fieldbus (Hardcover)
Geng Liang, Wen Li, Dazhong Li
R5,279 R4,589 Discovery Miles 45 890 Save R690 (13%) Ships in 12 - 17 working days

This book provides comprehensive research on the communication performance of a real time industrial fieldbus. Several important topics were investigated, such as how to ensure the transmission of real-time messages within a maximum bound time along the industrial fieldbus mentioned in this book. Profibus, FF, WorldFIP and CAN are all well-proved solutions for real-time communication systems, based on a simplified timed token (TT) protocol and bus scheduling. The following subjects dealing with the real-time communication performance of an industrial fieldbus were investigated and studied in this book. Features: 1) Concept and essentiality of timed-token MAC protocol with the effect of its parameter in real-time characteristics; 2) MAC mechanism in Profibus, timing analysis, optimization of acyclic bandwidth allocation, and the approaches to guarantee the real-time behaviour of the Profibus protocol; 3) Principles of acyclic data communication, and analysis of the delay performance of time-critical and time-available data in FF fieldbus data link layer token-passing service; 4) Communication models in WorldFIP network, Producer/Distributor/Consumer concept, response time analysis for sporadic traffic and investigation of the worst-case response time issues; 5) Communication mechanism in CAN fieldbus with its performance analysis and evaluation in real-time applications. The academic level of this book is relatively high and professional. It is suitable as a reference for university graduates, lecturers and researchers.

Journal of Cyber Security and Mobility (5-3) (Paperback): Antoni Gobeo, Connor Fowler, William J. Buchanan Journal of Cyber Security and Mobility (5-3) (Paperback)
Antoni Gobeo, Connor Fowler, William J. Buchanan
R1,022 Discovery Miles 10 220 Ships in 10 - 15 working days
Mastering Wireshark (Paperback): Charit Mishra Mastering Wireshark (Paperback)
Charit Mishra
R1,351 Discovery Miles 13 510 Ships in 10 - 15 working days

Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book * Master Wireshark and train it as your network sniffer * Impress your peers and get yourself pronounced as a network doctor * Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn * Install Wireshark and understand its GUI and all the functionalities of it * Create and use different filters * Analyze different layers of network protocols and know the amount of packets that flow through the network * Decrypt encrypted wireless traffic * Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware * Troubleshoot all the network anomalies with help of Wireshark * Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.

Journal of Ict Standardization (Paperback): Anand R Prasad Journal of Ict Standardization (Paperback)
Anand R Prasad
R926 Discovery Miles 9 260 Ships in 10 - 15 working days
High Income, Zero Debt Strategies for Network Marketers - Easy, Effective, and Free Ways on How to Boost Your Network Marketing... High Income, Zero Debt Strategies for Network Marketers - Easy, Effective, and Free Ways on How to Boost Your Network Marketing Business (Paperback)
Leanne Toinette Higgins
R299 R246 Discovery Miles 2 460 Save R53 (18%) Ships in 10 - 15 working days
Learning Python Network Programming (Paperback): Dr M O Faruque Sarker, Sam Washington Learning Python Network Programming (Paperback)
Dr M O Faruque Sarker, Sam Washington
R1,353 Discovery Miles 13 530 Ships in 10 - 15 working days

0

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
De-mystifying the IPsec Puzzle
Shiela Frankel Hardcover R2,556 Discovery Miles 25 560
TLS Mastery
Michael W Lucas Hardcover R970 R838 Discovery Miles 8 380
IoT Protocols and Applications for…
Cristian Gonzalez Garcia, Vicente Garcia Diaz Hardcover R7,022 Discovery Miles 70 220
SNMP Mastery
Michael W Lucas Hardcover R973 R842 Discovery Miles 8 420
Broadband Wireless Access Networks for…
Raul Aquino Santos, Victor Rangel Licea, … Hardcover R6,188 Discovery Miles 61 880
Multimedia Transcoding in Mobile and…
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim Hardcover R5,157 Discovery Miles 51 570
Networking for Systems Administrators
Michael W Lucas Hardcover R960 R828 Discovery Miles 8 280
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton Hardcover R2,831 Discovery Miles 28 310
Symmetric Cryptographic Protocols
Mahalingam Ramkumar Hardcover R4,327 R3,324 Discovery Miles 33 240
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R816 Discovery Miles 8 160

 

Partners