The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Network Hardware

Most popular at the top

  • CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401)by Glen E. Clarke

    McGraw-Hill Education 2014; US$ 50.00

    The best fully integrated study system available for the CompTIA Security+ exam! Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. With hundreds of practice exam questions, including... more...

  • Security Assessment in Vehicular Networksby Suguo Du; Haojin Zhu

    Springer New York 2013; US$ 54.99

    This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the... more...

  • Cablingby Andrew Oliviero; Bill Woodward

    Wiley 2014; US$ 89.99

    Develop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts. Part I covers LAN Networks and Cabling Systems offers comprehensive coverage... more...

  • Internet of Things with the Arduino Yúnby Marco Schwartz

    Packt Publishing 2014; US$ 13.99

    All projects are explained in a step-by-step manner, always starting with the assembly of the hardware and followed by basic tests of every hardware component. You will then learn how to build exciting applications in a practical manner based on the details of the projects.This book is intended for people who already have some experience with the Arduino... more...

  • Queuing Theory and Telecommunicationsby Giovanni Giambene

    Springer US 2014; US$ 119.00

    Now in an expanded second edition, this text on current networking technologies and protocols covers theory and applications, and now includes fresh solved exercises as well as detailed treatment of new topics in networking, such as MPLS and access protocols. more...

  • Seamless and Secure Communications over Heterogeneous Wireless Networksby Jiannong Cao; Chisheng Zhang

    Springer New York 2014; US$ 54.99

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless... more...

  • Distributed Context-Aware Systemsby Paulo Ferreira; Pedro Alves

    Springer International Publishing 2014; US$ 54.99

    Context-aware systems aim to deliver a rich user experience by taking into account the current user context (location, time, activity, etc.), possibly captured without his intervention. For example, cell phones are now able to continuously update a user?s location while, at the same time, users execute an increasing amount of activities online, where... more...

  • Cognitive Resource Management for Heterogeneous Cellular Networksby Yongkang Liu; Xuemin (Sherman) Shen

    Springer International Publishing 2014; US$ 54.99

    This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the... more...

  • Intelligent Computing, Communication and Devicesby Lakhmi C. Jain; Srikanta Patnaik; Nikhil Ichalkaranje

    Springer India 2014; US$ 349.00

    In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is the next revolution, which the society will perceive... more...

  • Oracle SOA Suite 12c Handbookby Lucas Jellema

    McGraw-Hill Education 2015; US$ 70.00

    Master Oracle SOA Suite 12 c Design, implement, manage, and maintain a highly flexible service-oriented computing infrastructure across your enterprise using the detailed information in this Oracle Press guide. Written by an Oracle ACE director, Oracle SOA Suite 12c Handbook uses a start-to-finish case study to illustrate each concept and technique.... more...