Free Delivery Over $100
34508 books were found.
This two-volume set constitutes selected papers presented during the First International Conference on Advanced... Read More >>
This book constitutes revised selected papers from the workshops held at the 29th International Conference on Parallel... Read More >>
Provides a rhetorical analysis of the smart home. Read More >>
Read More >>
""This book delves into the fascinating realm of GANs, a groundbreaking area of machine learning that has transformative... Read More >>
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International... Read More >>
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no... Read More >>
Les communications de groupe s�curis�es ont gagn� en popularit� gr�ce � leurs fonctionnalit�s int�ressantes et prometteuses... Read More >>
"Dive deep into the enigmatic world of cyber espionage with ""Shadow Codes: The Master Spy of the Digital Age.""... Read More >>
The ideas of this book originates from the mobile WAVE approach which allowed us to implement citywide heterogeneous... Read More >>
"В машинном обучении разрабатываются модели и алгоритмы, способные учиться на данных и делать предсказания или суждения... Read More >>
"""Bridging the Digital Gap: Exploring the Role of Artificial Intelligence, Machine Learning, and Cybersecurity""... Read More >>
Les r�seaux de capteurs sans fil (WSN) sont consid�r�s comme une technologie en plein essor permettant de combler... Read More >>
Learn how to transform your SDLC fast by developing the key skills to shift left and complete projects in record... Read More >>
Explore the implementation of Wazuh for effective security monitoring through use cases and demonstrations of how... Read More >>
The importance of net neutrality cannot be overstated in the digital age. Throughout this book, we have explored... Read More >>
This book is a complete guide with detailed instructions on how to master your new device like a pro. Read More >>
Networks of today are going through a rapid evolution and there are many emerging areas of information networking... Read More >>
"In the ever-evolving landscape of cybersecurity, proficiency in Command and Control (C2) frameworks is not just... Read More >>