Free Delivery Over $100
34516 books were found.
Desde a primeira publicação da norma IEEE 802.16, muitos mecanismos e conceitos de segurança foram alterados. Hoje... Read More >>
SCADA-Systeme (Supervisory Control and Data Acquisition) sind für die Steuerung und Überwachung industrieller Prozesse... Read More >>
Depuis la première publication de la norme IEEE 802.16, de nombreux mécanismes et concepts de sécurité ont été modifiés.... Read More >>
I sistemi SCADA (Supervisory Control and Data Acquisition) sono responsabili del controllo e del monitoraggio dei... Read More >>
Les systèmes de contrôle et d'acquisition de données (SCADA) sont chargés de contrôler et de surveiller les processus... Read More >>
С момента первой публикации стандарта IEEE 802.16 многие механизмы и концепции безопасности претерпели изменения.... Read More >>
Os sistemas de Controlo de Supervisão e Aquisição de Dados (SCADA) são responsáveis pelo controlo e monitorização... Read More >>
Seit der ersten Veröffentlichung der Norm IEEE 802.16 haben sich viele Sicherheitsmechanismen und -konzepte geändert.... Read More >>
Владение архивами необходимость эффективного и действенного управления единым окном для создания бизнеса / Киншаса,... Read More >>
"Mastery of archives: a necessity for the effective and efficient management of Single Window for Business Creation... Read More >>
"Domínio dos arquivos: uma necessidade para a gestão eficaz e eficiente da Janela Única para Criação de Negócios... Read More >>
"Padronanza degli archivi: una necessità per la gestione efficace ed efficiente di Single Window for Business Creation... Read More >>
"Das Buch ""La maîtrise des archives: une nécessité pour la gestion efficace et efficiente de Guichet unique de... Read More >>
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks... Read More >>
This book constitutes the proceedings of the 25th Italian Conference on Geomatics for Green and Digital Transition,... Read More >>
La libertà nella mobilità e la flessibilità è fornita dalla capacità di ottenere l'ingresso wireless in qualsiasi... Read More >>
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the... Read More >>
Faced with relentless technological aggression in the twenty-first century, how can Western nations fight back to... Read More >>
This book features a collection of high-quality, peer-reviewed papers presented at the Fifth International Conference... Read More >>
Identifies the Project Management Office (PMO) as the essential business integrator of the people, processes, and... Read More >>
The book covers computational statistics, its methodologies and applications for IoT device. It includes the details... Read More >>
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 13th International Conference on Progress in Cryptology in... Read More >>
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security... Read More >>