Free Delivery Over $100
34548 books were found.
Geared mainly toward beginners readers, the topic of Computer Networking is becoming increasingly important today... Read More >>
Consider how уоu use a computer in a tурісаl dау. Fоr еxаmрlе, уоu start wоrkіng оn a report, аnd оnсе you hаvе... Read More >>
Una cosa es segura, CCNA (Cisco Certified Network Associate) es una certificaci�n imprescindible. En cualquier parte... Read More >>
Lis ingenieros de redes que quieren avanzar en sus carreras o aprender m�s sobre la tecnolog�a de Cisco con la que... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Cellular Automata for Research... Read More >>
This book constitutes the refereed proceedings of the 30th International Conference on Logic-Based Program Synthesis... Read More >>
Get Safe Online! This cute password book for women offers enough room to store all your important passwords,... Read More >>
This cute password book offers enough room to store all your important passwords, pins, hints, and other additional... Read More >>
This password logbook for men offers enough room to store all your important passwords, pins, hints, and other additional... Read More >>
A network architecture, named NARA, based on recursive addressing is proposed. The Internet is modeled as a network... Read More >>
★★★ Explore Ubuntu OS ★★★ You've probably used Windows OS; maybe you've used MacOS. But Linux? Linux has... Read More >>
This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and... Read More >>
This two-volume set (CCIS 1367-1368) constitutes reviewed and selected papers from the 10th International Advanced... Read More >>
Read More >>
Discover the Key Tactics the Pros Use for Cyber Security (that Anyone Can Follow) Learn How to Handle Every Cyber... Read More >>
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications,... Read More >>
Data mining is a process of extracting hidden and useful information from the data. Outlier detection is a fundamental... Read More >>
In recent times, the number of Internet of Things (IoT) devices/sensors increased tremendously. To support the computational... Read More >>
Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography,... Read More >>
Since the introduction of Bitcoin—the first widespread application driven by blockchain—the interest of the public... Read More >>
Is your inbox a mess? Are you being flooded by e-mails on a daily basis? Have you given up hope of ever getting... Read More >>
Scrivere le password su carta e meglio che scriverle sul computer, anche se utilizzi programmi di criptazione specifici!... Read More >>
Do you want to have a head start in the job market making money freelance? Your customers never stop to use this... Read More >>
Do you want to learn the basic concepts to build your computer network in a simple and effective way? So, you're... Read More >>