Products

Product categories

Filters

Filters

Clear all
45 products
Sort by
Sort by
Handbook of Mobile Broadcasting: DVBH, DMB, ISDBT, AND MEDIAFLO (Internet and Communications),Used Handbook of Mobile Broadcasting: DVBH, DMB, ISDBT, AND MEDIAFLO (Internet and Communications),Used
Add to wishlist
Quick view
Add to compare
Handbook of Mobile Broadcasting: DVBH, DMB, ISDBT, AND MEDIAFLO (Internet...
Operators are introducing mobile television and digital video content services globally. The Handbook of Mobile Broadcasting addresses all aspects of these services, providing a comprehensive...
Sale price$49.36 Regular price$70.51
Quantity
Add to cart
HighPerformance Web Databases: Design, Development, and Deployment,Used HighPerformance Web Databases: Design, Development, and Deployment,Used
Add to wishlist
Quick view
Add to compare
HighPerformance Web Databases: Design, Development, and Deployment,Used
As Webbased systems and ecommerce carry businesses into the 21st century, databases are becoming workhorses that shoulder each and every online transaction. For organizations to...
Sale price$150.23 Regular price$214.61
Quantity
Add to cart
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition,New Information Security Policies and Procedures: A Practitioner's Reference, Second Edition,New
Add to wishlist
Quick view
Add to compare
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition,New
Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is...
Sale price$52.53 Regular price$75.04
Quantity
Add to cart
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition,Used Information Security Policies and Procedures: A Practitioner's Reference, Second Edition,Used
Add to wishlist
Quick view
Add to compare
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition,Used
Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is...
Sale price$12.32 Regular price$17.60
Quantity
Add to cart
Information Security Policies, Procedures, and Standards,Used Information Security Policies, Procedures, and Standards,Used
Add to wishlist
Quick view
Add to compare
Information Security Policies, Procedures, and Standards,Used
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An...
Sale price$9.00 Regular price$12.86
Quantity
Add to cart
Sold out
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks (Wireless Networks and Mobile Communications),Used Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks (Wireless Networks and Mobile Communications),Used
Add to wishlist
Quick view
Add to compare
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks (Wireless Networks...
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides highspeed, highbandwidth efficiency and highcapacity multimedia services for both...
Sale price$307.99 Regular price$439.99
Quantity
Add to cart
New
Mpls For Metropolitan Area Networks,Used Mpls For Metropolitan Area Networks,Used
Add to wishlist
Quick view
Add to compare
Mpls For Metropolitan Area Networks,Used
Metro Service Providers are increasingly turning to MultiProtocol Label Switching (MPLS) to converge disparate networks and services into a unified core, maintain quality, and deliver...
Sale price$18.48 Regular price$26.40
Quantity
Add to cart
New Directions in Internet Management (Best Practices),Used New Directions in Internet Management (Best Practices),Used
Add to wishlist
Quick view
Add to compare
New Directions in Internet Management (Best Practices),Used
What is the business model for making money on the Internet and how does it function? The answer to this question will determine the shape...
Sale price$28.59 Regular price$40.84
Quantity
Add to cart
Official (ISC)2 Guide to the ISSMP CBK ((ISC)2 Press),Used Official (ISC)2 Guide to the ISSMP CBK ((ISC)2 Press),Used
Add to wishlist
Quick view
Add to compare
Official (ISC)2 Guide to the ISSMP CBK ((ISC)2 Press),Used
As the recognized leader in the field of information security education and certification, the (ISC)2 promotes the development of information security professionals around the world....
Sale price$23.85 Regular price$34.07
Quantity
Add to cart
Performance Modeling And Analysis Of Bluetooth Networks: Polling, Scheduling, And Traffic Control,Used Performance Modeling And Analysis Of Bluetooth Networks: Polling, Scheduling, And Traffic Control,Used
Add to wishlist
Quick view
Add to compare
Performance Modeling And Analysis Of Bluetooth Networks: Polling, Scheduling, And...
Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages...
Sale price$53.07 Regular price$75.81
Quantity
Add to cart
Processbased Software Project Management,Used Processbased Software Project Management,Used
Add to wishlist
Quick view
Add to compare
Processbased Software Project Management,Used
Not connecting software project management (SPM) to actual, realworld development processes can lead to a complete divorcing of SPM to software engineering that can undermine...
Sale price$129.62 Regular price$185.17
Quantity
Add to cart
Securing Windows NT/2000: From Policies to Firewalls,Used Securing Windows NT/2000: From Policies to Firewalls,Used
Add to wishlist
Quick view
Add to compare
Securing Windows NT/2000: From Policies to Firewalls,Used
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations...
Sale price$85.13 Regular price$121.61
Quantity
Add to cart
Security without Obscurity,Used Security without Obscurity,Used
Add to wishlist
Quick view
Add to compare
Security without Obscurity,Used
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the...
Sale price$112.69 Regular price$160.99
Quantity
Add to cart
Server Disk Management in a Windows Environment,Used Server Disk Management in a Windows Environment,Used
Add to wishlist
Quick view
Add to compare
Server Disk Management in a Windows Environment,Used
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server...
Sale price$225.47 Regular price$322.10
Quantity
Add to cart
Server Management (Best Practices),Used Server Management (Best Practices),Used
Add to wishlist
Quick view
Add to compare
Server Management (Best Practices),Used
This singlevolume desktop reference provides comprehensive information on all server issues featuring contributions from experts in the field. Engineers for system vendors, systems integrators, major...
Sale price$38.58 Regular price$55.11
Quantity
Add to cart
Software Configuration Management,New Software Configuration Management,New
Add to wishlist
Quick view
Add to compare
Software Configuration Management,New
An effective systems development and design process is far easier to explain than it is to implement. A framework is needed that organizes the life...
Sale price$196.91 Regular price$281.30
Quantity
Add to cart

Recently viewed products