Network Computers
[630 results priced between £10£1,000]

Sort:
630 network computers £10 £1,000 /l/network-computers?page=7
  • Computer Networking - BEng (Hons)
    Computer Networking - BEng (Hons)

    Project. Ecommerce & Ebusiness. Computer & Network Security (Cisco). Wireless Networks (Cisco). Network Planning and Simulation. Mobile Applications (Option). Extension of Knowledge Module (language) (Option). Ethical Hacking (Option). Extension of Knowledge Module (short) (Option).

    £10,000.00
    londonmet.ac.uk
  • RG58 BNC Network Plug to Plug 7.5m
    RG58 BNC Network Plug to Plug 7.5m

    These cables are used to network computers together using RG58 co-axial cable via 10Mbps BNC ports

    £7.61
    cablecity.co.uk
  • ANTI-VIRUS - 2 computers One year
    ANTI-VIRUS - 2 computers One year

    Detects and stops viruses, threats and malwareGreat easy to use protection everyone needsOur job is to stop viruses before they even get to your PC. We check your files before you open them, your Facebook links before you click, your email before it gets to you and your websites before you visit them.You get: AntiVirus, AntiMalware (AVG Resident Shield), AVG Anti-Rootkit, AVG Email Scanner, AVG Protective Cloud Technology, AVG Community Protection Network, AVG LinkScanner Surf-Shield, AVG Social...

    £34.99
    my-pet-shop.co.uk
  • RG58 BNC Network Plug to Plug 10.0m
    RG58 BNC Network Plug to Plug 10.0m

    These cables are used to network computers together using RG58 co-axial cable via 10Mbps BNC ports

    £10.16
    cablecity.co.uk
  • Intermec CN70/CN70e Ultra-Rugged Mobile Computers : CN70AN3KNU3W2100
    Intermec CN70/CN70e Ultra-Rugged Mobile Computers : CN70AN3KNU3W2100

    Intermec Printers & Intermec Scanners: Intermec develops, manufactures and integrates wired and wireless automated data collection, Intellitag RFID (radio frequency identification) and mobile computing systems for companies worldwide. Its total solution approach offers companies assurance that, with Intermec's network of leading technology partners, Intermec and its team can provide complete answers to company's supply chain information requirements, from concept to completion

    £1,220.52
    barcode-uk.com
  • RG58 BNC Network Plug to Plug 2.0m
    RG58 BNC Network Plug to Plug 2.0m

    These cables are used to network computers together using RG58 co-axial cable via 10Mbps BNC ports

    £3.01
    cablecity.co.uk
  • Peerless ALCAT5E05 Computer Accessories
    Peerless ALCAT5E05 Computer Accessories

    5m Cat5e Network Lead with Up To 100Mbps Data Transfer Rates. 24K gold-plated contacts. Oxygen Free Copper (OFC) conductors. PVC outer jacket.

  • Analytical Network and System Administration
    Analytical Network and System Administration

    Network and system administration usually refers to the skill of keeping computers and networks running properly.  But in truth, the skill needed is that of managing complexity.  This book describes the science behind these complex systems, independent of the actual operating systems they work on. It provides a theoretical approach to systems administration that:saves time in performing common system administration tasks.allows safe utilization of untrained and trained help in maintaining mission...

  • Applied Cryptography and Network Security
    Applied Cryptography and Network Security

    The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8-11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent...

    £95.55
    wordery.com
  • Asia's Computer Challenge
    Asia's Computer Challenge

    Asia's Computer Challenge : Hardback : Oxford University Press Inc : 9780195122015 : 01 Oct 1998 : This book examines the evolution of the computer industry in the Pacific Asia region. It explains the key factors that account for the different levels of success among the nations in the area, and explores the strategic implications for the United States and the Asian Pacific countries as they compete in computers in the emerging network era.

    £39.74
    wordery.com
  • ATM Network Performance
    ATM Network Performance

    ATM Network Performance, Second Edition, describes approaches to computer and communication network management at the ATM layer of the protocol hierarchy. The focus is on satisfying quality-of-service requirements for individual connections. Results in both areas of bandwidth scheduling and traffic control are explained. Recent results in end-to-end performance, provisioning for video connections and statistical multiplexing are also described. All of the material has been updated where appropriate...

    £101.85
    wordery.com
  • Attack and Defend Computer Security Set
    Attack and Defend Computer Security Set

    Defend your networks and data from attack with this unique two-book security setThe Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker’s Handbook and Malware Analyst’s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves.The Web...

  • British Telecom WIFI600KIT Computer Accessories
    British Telecom WIFI600KIT Computer Accessories

    Experience fantastic speeds anywhere within your house with the BT Dual Band Wireless Access Point. Upgrade your wireless range in minutes thanks to the Access points simple set up. Simply plug it in and you're ready to go. The dual band technology found within the Access point uses a second Wi-Fi signal to improve the overall reliability of your network, allowing you to take advantage of reliable streaming and faster downloads.

  • Cellular Neural Networks and Visual Computing
    Cellular Neural Networks and Visual Computing

    Cellular Nonlinear/neural Network (CNN) technology is both a revolutionary concept and an experimentally proven new computing paradigm. Analogic cellular computers based on CNNs are set to change the way analog signals are processed and are paving the way to an entire new analog computing industry. This unique undergraduate level textbook includes many examples and exercises, including CNN simulator and development software accessible via the Internet. It is an ideal introduction to CNNs and analogic...

  • Collaborative Networks and Their Breeding Environments
    Collaborative Networks and Their Breeding Environments

    Progress in collaborative networks continues showing a growing number of manifestations and has led to the acceptance of Collaborative Networks (CN) as a new scientific discipline. Contributions to CN coming from multiple reference disciplines has been extensively investigated. In fact developments in CN have benefited from contributions of multiple areas, namely computer science, computer engineering, communications and networking, management, economy, social sciences, law and ethics, etc. Furthermore...

    £148.05
    wordery.com
  • Computer Attack and Cyberterrorism
    Computer Attack and Cyberterrorism

    Provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. This title describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against US infrastructure computers.

  • Computer Crimes and Digital Investigations
    Computer Crimes and Digital Investigations

    Computer and network-based crime is a rapidly growing phenomenon and problem for individuals, organisations and society as a whole, whether in the form of viruses or the distribution of child pornography. Following September 11th 2001, the horrific terrorism attacks on the London transport system in July 2005, and the threat of further attack through chemical and biological weapons, there is a broad governmental recognition of the vulnerability of society to attacks against critical infrastructure...

    £99.97
    wordery.com
  • Computer Engineering and Networking
    Computer Engineering and Networking

    This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related areas. The book presents papers from The Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) which was held on 20-21 July, in Shanghai, China.

  • Computer Integrated Manufacturing
    Computer Integrated Manufacturing

    The Current state of expectations is that Computer Integrated Manufacturing (CIM) will ulti- mately determine the industrial growth of world nations within the next few decades. Computer Aided Design (CAD), Computer Aided Manufacturing (CAM), Flexible Manufacturing Systems (FMS), Robotics together with Knowledge and Information Based Systems (KIBS) and Com- munication Networks are expected to develop to a mature state to respond effectively to the managerial requirements of the factories of the future...

    £76.51
    wordery.com
  • Computer Methods for Analysis of Mixed-Mode Switching Circuits
    Computer Methods for Analysis of Mixed-Mode Switching Circuits

    Computer Methods for Analysis of Mixed-Mode Switching Circuits provides an in-depth treatment of the principles and implementation details of computer methods and numerical algorithms for analysis of mixed-mode switching circuits. Major topics include: -Computer-oriented formulation of mixed-mode switching circuits, -Network functions of linear and nonlinear time-varying systems, -Numerical Laplace inversion based integration algorithms and inconsistent initial conditions, -Time domain analysis...

    £102.02
    wordery.com
  • Computer Networking First-step
    Computer Networking First-step

    Your first step into the world of computer networking * No experience required * Includes clear and easily understood explanations * Makes learning easy Your first step to computer networking begins here! * Learn basic networking terminology * Understand how information is routed from place to place * Explore Internet connectivity secrets * Protect your computer from intrusion * Build local-area networks (LANs) Welcome to the world of networking! Networking and the Internet touch our lives in untold...

    £18.10
    wordery.com
  • Computer Networking in a Digital Age
    Computer Networking in a Digital Age

    “Computer Networking in the Digital Age” is a unique look at the field of information technology and networking. Whether you are new to the field or an IT professional, the tips and tricks presented throughout the text are sure to help further your career and expand your mind. “Computer Networking in the Digital Age” will provide you with in-depth tutorials on how to capture and analyze network traffic, harden client computers, provide up-to-date security, and deal with the ever evolving field of...

  • Computer Networks 5th Revised Edition
    Computer Networks 5th Revised Edition

    The Title "Computer Networks 5th Revised Edition" is written by I.A. Dhotre. This book was published in the year 2010. The book displayed here is a 5th Revised Edition edition. This book has total of pp. 536 (Pages). The publisher of this title is Technical Publications. Computer Networks 5th Revised Edition is currently Available with us.

  • Computer Performance Engineering
    Computer Performance Engineering

    This volume contains the proceedings of the 7th European Performance En- neering Workshop (EPEW 2010), held in Bertinoro, Italy, on September 23-24, 2010. The purpose of this workshop series is to gather academic and industrial researchers working on all aspects of performance engineering. This year the workshop was structured around three main areas: system and network p- formance engineering, software performance engineering, and the modeling and evaluation techniques supporting them. This edition...

    £43.52
    wordery.com
  • Computer Science and Ambient Intelligence
    Computer Science and Ambient Intelligence

    This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holistic view, it covers various levels of abstraction, ranging from fundamental to advanced concepts and brings together the contributions of various specialists in the field.Moreover, the book covers the key areas of computer science concerned with the emergence of ambient intelligence (e.g. interaction, middleware, networks, information systems, etc.)...

  • Computer Science and IT
    Computer Science and IT

    Computer Science and IT : Paperback : Raintree : 9781406261080 : 14 Aug 2014 : When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators ca ...

    £8.89
    wordery.com
  • Computer Science Competitions
    Computer Science Competitions

    This is a compilation of articles from Wikipedia about Computer Science Competitions, formatted as an ebook for easy reading. Topics include:ACM ICPC Dhaka SiteAI ChallengeAavishkaarAmerican Computer Science LeagueAustralasian Schools Computer CompetitionAustralian Informatics OlympiadCADE ATP System CompetitionCS GamesCS Games 2006CS Games 2009CS Games 2011Chatterbox ChallengeCloudballCompetitions and prizes in artificial intelligenceComputer bridgeDARPA Network ChallengeDARPA Shredder Challenge...

  • Computer Science Research & Technology
    Computer Science Research & Technology

    Presents research from across the globe in the field of computer science research, technology and applications. This title includes topics such as: Ethernet Passive Optical Networks; Human-Computer Interaction Systems; Mobile multicast protocols in wireless networks; and, STB and Smart Cards in IPTV Broadcasting.

    £116.88
    pickabook.co.uk
  • Computer Search Algorithms
    Computer Search Algorithms

    Computer Search Algorithms : Hardback : Nova Science Publishers Inc : 9781611225273 : 19 Jan 2012 : Presents research data in the study of computer search algorithms, including live soft-matter quantum computing; heuristic searches applied to the resolution of a relevant optimisation problem from the telecommunications domain; the emergence and advances of quantum search algorithms; artificial neural networks; and, more.

    £61.05
    wordery.com
  • Computer Security Fundamentals
    Computer Security Fundamentals

    Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion...