Free Delivery Over $100
34849 books were found.
This book presents a comprehensive exploration of federated learning and its transformative potential across industries,... Read More >>
Docker Deep Dive: Master Containerization, Kubernetes, and Production Deployment is your ultimate step-by-step guide... Read More >>
The traditional ""castle-and-moat"" approach to network security is obsolete. In a world where the perimeter has... Read More >>
This hands-on guide takes you from setting up Pulumi to building scalable, testable, and secure infrastructure projects.... Read More >>
The purpose of the Historical Review of the Communications Unit is to promote the analysis of the ethical and responsible... Read More >>
Celem Przeglądu Historii Jednostek Lącz ności jest promowanie analizy etycznego i odpowiedzialnego wykorzystania... Read More >>
Lo scopo della Communications Unit History Review è quello di promuovere l'analisi sull'uso etico e responsabile... Read More >>
O objetivo da Revista Histórica da Unidade de Comunicações é promover a análise sobre a utilização ética e responsável... Read More >>
L'objectif de la revue historique de l'Unité des communications est de promouvoir l'analyse de l'utilisation éthique... Read More >>
Transform your cloud security expertise with the most comprehensive guide to multi-cloud security enhanced by artificial... Read More >>
Der Zweck der Communications Unit History Review besteht darin, die Analyse des ethischen und verantwortungsvollen... Read More >>
Mit der zunehmenden Verbreitung der drahtlosen Kommunikation tauchen auch neue Arten von Angriffen auf. Eine davon... Read More >>
Das Verständnis der Funktionen jeder einzelnen Schicht des OSI-Referenzmodells ist sehr wichtig, wenn es um die... Read More >>
Com o aumento das comunicações sem fios, surgem novos tipos de ataques. Um deles é o ataque de phishing. Um algoritmo... Read More >>
Con l'aumento delle comunicazioni wireless, stanno comparendo nuovi tipi di attacchi. Uno di questi è l'attacco... Read More >>
Zrozumienie funkcji każdej z warstw modelu referencyjnego OSI jest bardzo ważne przy rozwiązywaniu problemów związanych... Read More >>
Comprendere le funzioni di ciascuno dei livelli del modello di riferimento OSI è molto importante quando si tratta... Read More >>
Compreender as funções de cada uma das camadas do Modelo de Referência OSI é muito importante quando se trata de... Read More >>
Wraz z rozwojem komunikacji bezprzewodowej pojawiają się nowe rodzaje ataków. Jednym z nich jest atak phishingowy.... Read More >>
Il est très important de comprendre les fonctions de chacune des couches du modèle de référence OSI pour dépanner... Read More >>
Avec l'essor des communications sans fil, de nouveaux types d'attaques apparaissent. L'une d'entre elles est l'attaque... Read More >>
Read More >>
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration... Read More >>
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern... Read More >>
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025,... Read More >>