Network Computers
[648 results priced between £5£1,000]

648 network computers £5 £1,000 /l/network-computers?page=8
  • Computer Networking First-step
    Computer Networking First-step

    Your first step into the world of computer networking * No experience required * Includes clear and easily understood explanations * Makes learning easy Your first step to computer networking begins here! * Learn basic networking terminology * Understand how information is routed from place to place * Explore Internet connectivity secrets * Protect your computer from intrusion * Build local-area networks (LANs) Welcome to the world of networking! Networking and the Internet touch our lives in untold...

  • Computer Networking in a Digital Age
    Computer Networking in a Digital Age

    “Computer Networking in the Digital Age” is a unique look at the field of information technology and networking. Whether you are new to the field or an IT professional, the tips and tricks presented throughout the text are sure to help further your career and expand your mind. “Computer Networking in the Digital Age” will provide you with in-depth tutorials on how to capture and analyze network traffic, harden client computers, provide up-to-date security, and deal with the ever evolving field of...

  • Computer Networks 5th Revised Edition
    Computer Networks 5th Revised Edition

    The Title "Computer Networks 5th Revised Edition" is written by I.A. Dhotre. This book was published in the year 2010. The book displayed here is a 5th Revised Edition edition. This book has total of pp. 536 (Pages). The publisher of this title is Technical Publications. Computer Networks 5th Revised Edition is currently Available with us.

  • Computer Performance Engineering
    Computer Performance Engineering

    This book constitutes the refereed post-proceedings of the 9th European Performance Engineering Workshop, EPEW 2012, held in Munich, Germany, and the 28th UK Performance Engineering Workshop, UKPEW 2012, held in Edinburgh, UK, in July 2012. The 15 regular papers and one poster presentation paper presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics from classical performance modeling areas such as wireless network...

  • Computer Programs for Qualitative Data Analysis
    Computer Programs for Qualitative Data Analysis

    Written by qualitative researchers for qualitative researchers, and not presuming extensive computer experience, this user-friendly guide takes a critical look at the wide range of software currently available. The book gives detailed reviews of 24 programs in five major categories: text retrievers, textbase managers, code-and-retrieve programs, code-based theory-builders and conceptual network-builders. In addition, the book provides ratings of over 75 features per program. The authors also offer...

  • Computer Science and Ambient Intelligence
    Computer Science and Ambient Intelligence

    This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holistic view, it covers various levels of abstraction, ranging from fundamental to advanced concepts and brings together the contributions of various specialists in the field.Moreover, the book covers the key areas of computer science concerned with the emergence of ambient intelligence (e.g. interaction, middleware, networks, information systems, etc.)...

  • Computer Science Competitions
    Computer Science Competitions

    This is a compilation of articles from Wikipedia about Computer Science Competitions, formatted as an ebook for easy reading. Topics include:ACM ICPC Dhaka SiteAI ChallengeAavishkaarAmerican Computer Science LeagueAustralasian Schools Computer CompetitionAustralian Informatics OlympiadCADE ATP System CompetitionCS GamesCS Games 2006CS Games 2009CS Games 2011Chatterbox ChallengeCloudballCompetitions and prizes in artificial intelligenceComputer bridgeDARPA Network ChallengeDARPA Shredder Challenge...

  • Computer Science Research & Technology
    Computer Science Research & Technology

    Presents research from across the globe in the field of computer science research, technology and applications. This title includes topics such as: Ethernet Passive Optical Networks; Human-Computer Interaction Systems; Mobile multicast protocols in wireless networks; and, STB and Smart Cards in IPTV Broadcasting.

  • Computer Search Algorithms
    Computer Search Algorithms

    Presents research data in the study of computer search algorithms, including live soft-matter quantum computing; heuristic searches applied to the resolution of a relevant optimisation problem from the telecommunications domain; the emergence and advances of quantum search algorithms; artificial neural networks; and, more.

  • Computer Security : ESORICS 2012
    Computer Security : ESORICS 2012

    This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security...

  • Computer Security Fundamentals
    Computer Security Fundamentals

    Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion...

  • Computer Security Handbook
    Computer Security Handbook

    The classic and authoritative reference in the field of computer security, now completely updated and revisedWith the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats...

  • Computer Structure and Logic
    Computer Structure and Logic

    Computer Structure and Logic Pearson Certification Team   The place to start your computer career! Learn about computers and networks from the ground up!   Learn about computers and networks from the ground up! Your first step toward certifications from CompTIA, Microsoft, or Cisco… absolutely no experience necessary! Explains every part of your computer and shows how each part works together Teaches simple troubleshooting and repair techniques Packed with real-world examples and case studies ...

  • Computer-based Design and Manufacturing
    Computer-based Design and Manufacturing

    This book offers insights into the methods and techniques required to implement a consumer-focused product design philosophy. It does this by integrating capabilities for intelligent information support and group decision-making utilizing a common enterprise network model and knowledge interface through shared technologies. It includes discussion of applied methods developed in the field of the product design and gives the latest research results.

  • Designing A Wireless Network
    Designing A Wireless Network

    Business is on the move - mobile computing must keep up!Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations.Designing Wireless Networks provides the necessary information on how to design...

  • Designing Windows 2000 Networks
    Designing Windows 2000 Networks

    This is a book for computer professionals who are preparing to deploy Windows 2000. Emphasis on real world deployment options. Lots of easy to understand examples. Plenty of illustrations with concise explanations. Scenario based solutions. Over 15 network diagrams.

  • Digital Evidence and Computer Crime
    Digital Evidence and Computer Crime

    Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital...

  • Future Computer, Communication, Control and Automation
    Future Computer, Communication, Control and Automation

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid...

  • Gesture and Sign Language in Human-Computer Interaction
    Gesture and Sign Language in Human-Computer Interaction

    This book presents the thoroughly refereed post-workshop proceedings of an International Workshop on Gesture and Sign Language in Human-Computer Interaction held in Bielefeld, Germany, in 1997. The book presents 25 revised papers together with two invited lectures. Recently, gesture and sign language have become key issues for advanced interface design in the humanization of computer interaction: AI, neural networks, pattern recognition, and agent techniques are having a significant impact on this...

  • Hackproofing Your Wireless Network
    Hackproofing Your Wireless Network

    The only way to stop a hacker is to think like one!Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators...

  • Handbook of Optimization in Complex Networks
    Handbook of Optimization in Complex Networks

    Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding...

  • High Performance Networks
    High Performance Networks

    In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving...

  • Home Computer Networking
    Home Computer Networking

    Today networking has become a necessity to thousands of computer owners and it’s not a technological novelty anymore. The idea of having multiple computers networked together is not a new one. A networked system can save storage space on the hard drive and increase the operational speed on some machines. Space killing programs can be put on one computer that you can network to another computer saving precious memory on the main computer for more important things. There are several options in home...

  • Home Network Security Simplified
    Home Network Security Simplified

    A straightforward, graphic-based reference for securing your home network  Set up a firewall Secure your wireless network Stop adware and spyware Keep your children safe from online threats Prevent a virus outbreak Avoid Internet scams  Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your...

  • Hypertextual Networks of Concepts in Academic Writing
    Hypertextual Networks of Concepts in Academic Writing

    Writing and printing revolutionized the storage and preservation of knowledge. New writing technologies, such as the personal computer and hypertext, have not only different materiality but also non-linear characteristics that provide new ways of presenting, organizing, and manipulating texts, transforming the acts of reading and composing. Just as writing and printing facilitated the preservation and sharing of knowledge, the personal computer and the hypertext have the potential to foster associative...

  • Intelligent Broadband Multimedia Networks
    Intelligent Broadband Multimedia Networks

    Intelligent Broadband Multimedia Networks is a non-mathematical, but highly systems oriented, coverage of modern intelligent information networks. This volume focuses on the convergence of computers and communications technologies. Most of the concepts that are generic to all intelligent networks, and their microscopic and macroscopic functions, are presented. This book includes specific architectures that can be used by network designers and planners, telecommunications managers, computer...

  • Intelligent Internet Knowledge Networks
    Intelligent Internet Knowledge Networks

    Introducing readers to the basic concepts in total program control of the intelligent agents and machines, Intelligent Internet Knowledge Networks explores the design and architecture of information systems that include and emphasize the interactive role of modern computer/communication systems and human beings.

  • Introducing Social Networks
    Introducing Social Networks

    This first-rate introduction to the study of social networks combines a hands-on manual with an up-to-date review of the latest research and techniques. The authors provide a thorough grounding in the application of the methods of social network analysis. They offer an understanding of the theory of social structures in which social network analysis is grounded, a summary of the concepts needed for dealing with more advanced techniques, and guides for using the primary computer software packages...

  • NAS Network External Drives
    NAS Network External Drives

    These network drives will connect to your desktop or laptop computer. In addition they can be connected directly to your router switch or hub to give access to your shared files to everyone on the network.

  • Network Security For Dummies
    Network Security For Dummies

    CNN is reporting that a vicious new virus is wreaking havoc on the world’s computer networks. Somebody’s hacked one of your favorite Web sites and stolen thousands of credit card numbers. The FBI just released a new report on computer crime that’s got you shaking in your boots. The experts will tell you that keeping your network safe from the cyber-wolves howling after your assets is complicated, expensive, and best left to them. But the truth is, anybody with a working knowledge of networks and...