Free Delivery Over $100
33695 books were found.
Microsoft has changed the technology so customers can now select, evaluate and implement Microsoft Dynamics 365... Read More >>
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together... Read More >>
Linux for Hackers is a beginner's overview into the Linux hacking operating system distribution, and how to utilize... Read More >>
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:... Read More >>
SNMP is one of those system management skills that people acquire by experience, stumbling through one horrid implementation... Read More >>
"Abdul Alhazred's infamously rumored Networknomicon, or SNMP Mastery, has long been blamed for the Spanish Inquisition,... Read More >>
This book features the important elements and provisions crucial while studying for a CISSP exam. It addresses one... Read More >>
This book will review the management of applications throughout their lifecycle, from initial request through disposition.... Read More >>
This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately... Read More >>
Our greatest and most immediate national and personal security threats are state-sponsored cyberattacks moving at... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Convergent Cognitive Information... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Advances in Brain Inspired... Read More >>
This book constitutes the proceedings of the 7th International Workshop and Challenge on Computational Methods and... Read More >>
This book brings together papers presented at the International Conference on Artificial Intelligence in China (ChinaAI)... Read More >>
Read More >>
This book provides a novel perspective on the concept of memetics as applied to the development and evolution of... Read More >>
This book walks you through how to establish and grow a strong security operations team, including hiring the right... Read More >>
The second volume of this book includes selected high-quality research papers presented at the Fourth International... Read More >>
In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO) und des Informationssicherheitsmanagements... Read More >>
Presents the proceedings of the 2019 International Conference on Security and Management held July 29th - August... Read More >>
Presents the proceedings of the 2019 International Conference on Parallel and Distributed Processing Techniques... Read More >>
Presents the proceedings of the 2019 International Conference on Wireless Networks (ICWN '19) held July 29th - August... Read More >>
Presents the proceedings of the 2019 International Conference on Grid, Cloud, and Cluster Computing (GCC '19) held... Read More >>