Networking Communication

PUBLISHED


Viewing: 1 - 10 of 64
Published:
April 08, 2013
Author(s):
Anmol Misra; Abhishek Dubey
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the 
  Hardback
$59.95
Add to cart
Published:
April 04, 2013
Author(s):
Huansheng Ning
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.Answering fundamental questions about IoT architectures and models, Unit 
  Hardback
$99.95
Add to cart
Published:
March 26, 2013
Author(s):
Jessica Keyes
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their 
  Hardback
$79.95
Add to cart
Published:
November 21, 2012
Author(s):
Gilbert Held
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. 
  Paperback
$59.95
Add to cart
Published:
November 14, 2012
Editor(s):
David Hall; Chee-Yee Chong; James Llinas; Martin Liggins II
With the recent proliferation of service-oriented architectures (SOA), cloud computing technologies, and distributed-interconnected systems, distributed fusion is taking on a larger role in a variety of applications—from environmental monitoring and crisis management to intelligent buildings and 
  Hardback
$159.95
Add to cart
Published:
November 07, 2012
Editor(s):
Razvan Beuran
Emulation is a hybrid experimentation technique intended to bridge the gap between simulation and real-world testing. The key idea of emulation is to reproduce in real time and in a controlled manner the essential functionality of a system, so that it can interact with other real systems that can 
  Hardback
$129.95
Add to cart
Published:
October 29, 2012
Author(s):
Honbo Zhou
Although the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware 
  Hardback
$99.95
Add to cart
Published:
October 29, 2012
Author(s):
Zouheir Trabelsi; Kadhim Hayawi; Arwa Al Braiki; Sujith Samuel Mathew
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with 
  Hardback
$89.95
Add to cart
Published:
October 19, 2012
Editor(s):
Laurence T. Yang; Evi Syukur; Seng W. Loke
Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless 
  Hardback
$119.95
Add to cart
Published:
July 05, 2012
Author(s):
Timi Ogunjobi
Demystifying one of the most popular content management systems in use today, Drupal Web Profiles offers a complete introduction to the installation, configuration, and administration of Drupal versions 6 and 7. Filled with worked examples, step-by-step instructions, and hands-on projects, it 
  Hardback
$59.95
Add to cart

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2013 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us