Free Delivery Over $100
33717 books were found.
There has been an increase in cybercrime and a search for government or private company assets that have failed... Read More >>
On assiste � une augmentation de la cybercriminalit� et � la recherche d'actifs gouvernementaux ou d'entreprises... Read More >>
Read More >>
Mobile Ad-hoc-Netzwerke (MANETs) sind dezentralisierte Multi-Hop-Netzwerke, in denen die Zwischenknoten als Router... Read More >>
This book brings together chapters from leading world experts that signpost the way forward for industry and commerce... Read More >>
"Les r�seaux mobiles ad hoc (MANET) sont des r�seaux d�centralis�s et multi-sauts dans lesquels les noeuds interm�diaires... Read More >>
As redes m�veis ad-hoc (MANET) s�o redes descentralizadas e multi-hop onde os n�s interm�dios actuam como routers... Read More >>
La rete di sensori wireless (WSN) � considerata una tecnologia in via di sviluppo per colmare il divario tra il... Read More >>
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling... Read More >>
"""Seventy-five percent of organizations worldwide reported an attempted business email compromise attack last year.""... Read More >>
The Full-Duplex radio transmission technique is a prominent feature in the physical layer of the new IEEE 802.11ax... Read More >>
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
Das Konzept des Buches ist anschaulich und didaktisch fundiert und damit auch sehr gut für den Unterricht an technisch... Read More >>
Bitcoin con Rigor: Un estudio sobre el funcionamiento t�cnico de Bitcoin Desentra�ando Bitcoin En un mundo digital... Read More >>
This series of books is a result of collaboration between the Chinese Academy of Sciences and relevant national... Read More >>
Mastering Linux Administration, this book will help you become a proficient sysadmin and quickly adapt to the challenges... Read More >>
This easy-to-read guide helps you cultivate good development practices based on classic software design patterns... Read More >>
Questo studio intende contribuire a una maggiore disponibilit� di componenti stateful singleton con sessioni utente... Read More >>
Diese Studie soll dazu beitragen, die Verf�gbarkeit von zustandsbehafteten Singleton-Komponenten zu erh�hen, wenn... Read More >>
"In today's digital age, the importance of safeguarding your data and online presence cannot be overstated. ""Cybersecurity... Read More >>
Explore the state-of-the-art field of data security investigations with Template Validation of Data Security Investigations... Read More >>
"""Exploring Connectivity Patterns: Graph Theory in Chemistry"" by Jon Martin is an illuminating exploration into... Read More >>
"""Sbloccare la Blockchain: Innovations for Tomorrow's World"" offre un'esplorazione completa della tecnologia blockchain... Read More >>
"Le livre ""Unlocking the Blockchain: Innovations for Tomorrow's World"" propose une exploration compl�te de la... Read More >>