Free Delivery Over $100
34284 books were found.
The conference was planned to take place in Copenhagen, Denmark, but had to change to a virtual conference mode... Read More >>
Revision of: Access control, authentication, and public key infrastructure / Bill Ballad, Tricia Ballad, and Erin... Read More >>
In this book, we consider the most significant and emergent research topics in this domain, addressing major issues... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 28th International Conference on Case-Based Reasoning Research... Read More >>
Una delle principali sfide che Internet deve affrontare oggi è la qualità del servizio (QOS) per i dati multimediali... Read More >>
Jednym z glównych wyzwań stojących dziś przed Internetem jest jakośc uslug (QOS) w zakresie danych multimedialnych... Read More >>
Do you know if you were hacked? Do you know if some personal information was stolen from your system or account?... Read More >>
"Questo testo descrive la realizzazione di un progetto per il trattamento di lesioni da fratture, morbo di Parkinson,... Read More >>
Do you want to learn the basic concepts to build your computer network in a simple and effective way?read on. We... Read More >>
Have you always been fascinated by the hackers on TV? Do you want to introduce yourself to the world of hacking?... Read More >>
55% OFF for bookstores! Do you want to have a head start in the job market making money freelance? Your customers... Read More >>
This book focuses its attention on securing your Linux server. Linux has become one of the most used Operating system,... Read More >>
This book constitutes the proceedings of the Third International Workshop on Predictive Intelligence in Medicine,... Read More >>
A comprehensive guide to the concepts and applications of queuing theory and traffic theory Network Traffic Engineering:... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on Computational Methods in... Read More >>
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by... Read More >>
"Dieser Text beschreibt die Durchführung eines Projekts zur Behandlung von Verletzungen durch Knochenbrüche, Parkinson,... Read More >>
Wireless Sensor Network includes various numbers of resource constrained sensor nodes that are deployed within the... Read More >>
Dieses Buch befasst sich mit dem Schutz der Persönlichkeitsrechte der Nutzer von Social Networks. Read More >>
This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions,... Read More >>
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who... Read More >>