Free Delivery Over $100
34548 books were found.
A perfect Book to keep all your internet password information together and secure. The pages are arranged in alphabetical... Read More >>
Read More >>
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with... Read More >>
NOWHERE TO HIDE: Open Source Intelligence Gathering provides practical insight into the investigative tools and... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on... Read More >>
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Read More >>
Ce livre décrit la mise en oeuvre d'algorithmes pour assurer la sécurité et le respect de la vie privée dans les... Read More >>
Es wird eine Netzwerkarchitektur, genannt NARA, vorgeschlagen, die auf rekursiver Adressierung basiert. Das Internet... Read More >>
Questo libro descrive l'implementazione di algoritmi per fornire sicurezza e privacy nei servizi basati sul cloud.... Read More >>
Viene proposta un'architettura di rete, chiamata NARA, basata sull'indirizzamento ricorsivo. Internet è modellata... Read More >>
Une architecture de réseau, appelée NARA, basée sur l'adressage récursif est proposée. L'Internet est modélisé comme... Read More >>
Dieses Buch beschreibt die Implementierung von Algorithmen zur Gewährleistung von Sicherheit und Datenschutz in... Read More >>
Este livro descreve a implementação de algoritmos para fornecer segurança e privacidade em serviços baseados na... Read More >>
Zaproponowano architekturę sieciową o nazwie NARA, opartą na adresowaniu rekurencyjnym. Internet jest modelowany... Read More >>
Książka ta opisuje implementację algorytmów zapewniających bezpieczeństwo i prywatnośc w uslugach opartych na chmurze.... Read More >>
Uma arquitetura de rede, chamada NARA, baseada em endereçamento recursivo é proposta. A Internet é modelada como... Read More >>
This book provides a brief introduction to the history and evolution of the internet. Then, it introduces the Internet... Read More >>
Understand both uncoded and coded caching techniques in future wireless network design. Covering high-level architectures... Read More >>
Only one man--Tyler Jackson--can prevent a worldwide financial meltdown. Read More >>
Driving Automation and Autonomy is upon us and the problems that were predicted twenty years ago are appearing.... Read More >>
Mobilne sieci ad hoc (MANETs) mają dynamiczny charakter. Z tego powodu zaprojektowanie wydajnego protokolu routingu... Read More >>
As Redes Móveis Ad hoc (MANETs) são de natureza dinâmica. Devido a isso, o desenho de um protocolo de roteamento... Read More >>
Le reti ad hoc mobili (MANET) sono di natura dinamica. A causa di questo, la progettazione di un protocollo di routing... Read More >>