-
Introduction to Communications Technologies
Thanks to the advancement of faster processors within communication devices, there has been a rapid change in how information is modulated, multiplexed, managed, and moved.
₹6,199.00 -
Fundamentals of DSL Technology
The DSL arena is expanding rapidly, making it highly unlikely that any single author can adequately address the breadth and depth of the subject. Responding to the demand of designers worldwide, Fundamentals of DSL Technology combines the strengths of the field’s most renowned DSL experts, providing a foundation of all aspects of DSL system design.
₹12,999.00 -
Data Scheduling and Transmission Strategies
This book presents a framework for a new hybrid scheduling strategy for heterogeneous, asymmetric telecommunication environments.
₹12,450.00 -
Official (ISC)2 Guide to the CISSP CBK
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to date with the latest advances in technology and the new security threats they create.
₹5,599.00 -
Building and Maintaining a Data Warehouse
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is theoretically sound, is not especially easy. That’s the challenge that Building and Maintaininga Data Warehouse answers. Based on a foundation of industry-accepted principles, this work provides an easy-to-follow approach that is cohesive and holistic.
₹9,699.00 -
Interpreting the CMMI (R): A Process Improvement Approach
Written by experienced process improvement professionals who have developed and implemented computer based systems in organizations around the world, Interpreting the CMMI®: A Process Improvement Approach, Second Edition provides you with specific techniques for performing process improvement.
₹12,950.00 -
Insider Computer Fraud: An In-depth Framework for Detecting and Defending
₹3,485.00₹10,250.00Insider Computer Fraud: An In-depth Framework for Detecting and Defending
An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.
₹10,250.00 -
Handbook of IPv4 to IPv6 Transition
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6.
₹8,650.00 -
Elements of Compiler Design
In addition, the book presents many detailed examples and computer programs to emphasize the applications of the compiler algorithms. After studying this self-contained textbook, students should understand the compilation process, be able to write a simple real compiler, and easily follow advanced books on the subject.
₹10,599.00 -
Securing Converged IP Networks
It also provides recommendations for managing the assurance, implementation and operation of converged ICT network infrastructures and examines the future of ICT security and assurance under IP convergence.
₹10,250.00 -
Software Engineering Quality Practices
The author succinctly describes the nature and fundamental principles of design and incorporates them into an architectural framework, enabling you to apply the framework to the development of quality software for most applications. The text also analyzes engineering requirements, identifies poor requirements, and demonstrates how bad requirements can be transformed via several important quality practices.
₹11,299.00 -
TCP Performance over UMTS-HSDPA Systems
TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity, and shows how to reduce the interaction of wireless networks on TCP with minimal cost.
₹10,250.00 -
X Internet
Discussing computer–human interaction, the book details the development of a rich Internet environment, including graphical design, multimedia, architectures, software development techniques, tools, and information management for X-enriched systems, the components that make up many of the Web 2.0 applications so popular today. It also includes appendices that contain information on a framework for auditing X systems and various guides for using audio and video and building user interfaces. X Internet systems offer almost limitless possibilities for building rich, interactive systems that increase productivity and dramatically enhance the user experience. X Internet: The Executable and Extendable Internet provides a thorough yet accessible understanding of this new Internet that is becoming critical to software development and systems management.
₹10,799.00 -
UML for Developing Knowledge Management Systems
The book discusses knowledge acquisition and the types of knowledge that can be discovered within a domain. It offers an overview of types of models and the concepts behind them. It then reviews UML and how to apply UML to model knowledge. The book concludes by defining and applying the Knowledge Acquisition framework via a real-world case study.
₹11,299.00 -
Effective Software Maintenance and Evolution
With software maintenance costs averaging 50% of total computing costs, it is necessary to have an effective maintenance program in place. Aging legacy systems, for example, pose an especially rough challenge as veteran programmers retire and their successors are left to figure out how the systems operate.
₹12,950.00 -
FISMA Principles and Best Practices: Beyond Compliance
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
₹12,950.00 -
Data Center Storage: Cost-Effective Strategies, Implementation, and Management
We overspend on data center storage … yet, we fall short of business requirements. It’s not about the technologies. It’s about the proper application of technologies to deliver storage services efficiently and affordably. It’s about meeting business requirements dependent on data center storage. Spend less, deliver more.
₹12,950.00 -
Cyber Forensics: A Field Manual For Collecting
Now updated, this manual provides the information needed to track, monitor, investigate, document, and preserve both authorized and unauthorized actions that take place within an organizations operating environments. This second edition presents techniques that can help any computer security professional to identify misuse of a computer system.
₹12,950.00 -
Carrier Ethernet: Providing the Need for Speed
Facilitating high data transfers over long distances at a reasonable cost, Carrier Ethernet is solidifying its fundamental position as the core of next-generation networks. Since it first dazzled the IT world 40 years ago with its ability to move data over local networks, Ethernet has dramatically evolved in both form and function. And now, Carrier Ethernet, flexing its multi-gigabit muscle, is rapidly emerging as the undisputed technology of choice.
₹10,250.00 -
Context-Aware Pervasive Systems, Architectures for a New Breed of Applications
The concept of aware systems is among the most exciting trends in computing today, fueled by recent developments in pervasive computing, including new computers worn by users, embedded devices, smart appliances, sensors, and varieties of wireless networking technology. Context-Aware Pervasive Systems: The Architecture of a New Breed of Applications introduces a diverse set of application areas and provides blueprints for building context-aware behavior into applications.
₹10,250.00