Free Delivery Over $100
34508 books were found.
"Das Buch ""Foggy Horizons: Unraveling the Potential of Fog Computing"" bietet eine umfassende Untersuchung von... Read More >>
"Intitul� ""Embracing the Fog: Harnessing the Power of Mist Computing"", ce livre explore le concept de ""mist computing"",... Read More >>
Die Computerkriminalit�t hat zugenommen, und es wird nach staatlichen oder privaten Unternehmen gesucht, die nicht... Read More >>
Si � assistito a un aumento della criminalit� informatica e alla ricerca di beni governativi o di aziende private... Read More >>
Наблюдается рост киберпреступности и поиск активов государственных или частных компаний, которые не обеспечивают... Read More >>
There has been an increase in cybercrime and a search for government or private company assets that have failed... Read More >>
On assiste � une augmentation de la cybercriminalit� et � la recherche d'actifs gouvernementaux ou d'entreprises... Read More >>
"Les r�seaux mobiles ad hoc (MANET) sont des r�seaux d�centralis�s et multi-sauts dans lesquels les noeuds interm�diaires... Read More >>
As redes m�veis ad-hoc (MANET) s�o redes descentralizadas e multi-hop onde os n�s interm�dios actuam como routers... Read More >>
La rete di sensori wireless (WSN) � considerata una tecnologia in via di sviluppo per colmare il divario tra il... Read More >>
Heutzutage sind mobile Ger�te mit mehreren Netzwerkschnittstellen ausgestattet. Multihoming bedeutet, dass ein Ger�t... Read More >>
Oggi i dispositivi mobili sono dotati di pi� interfacce di rete. Per multihoming si intende un dispositivo connesso... Read More >>
Atualmente, os dispositivos m�veis est�o equipados com m�ltiplas interfaces de rede. O multihoming refere-se a um... Read More >>
De nos jours, les appareils mobiles sont �quip�s de plusieurs interfaces r�seau. Le multihoming d�signe un appareil... Read More >>
Mobile Ad-hoc-Netzwerke (MANETs) sind dezentralisierte Multi-Hop-Netzwerke, in denen die Zwischenknoten als Router... Read More >>
This book brings together chapters from leading world experts that signpost the way forward for industry and commerce... Read More >>
Replicate and synchronize data between different systems with SAP LT Replication Server! With information on monitoring... Read More >>
"""Seventy-five percent of organizations worldwide reported an attempted business email compromise attack last year.""... Read More >>
The Full-Duplex radio transmission technique is a prominent feature in the physical layer of the new IEEE 802.11ax... Read More >>
This book constitutes the refereed proceedings of the 26th International Conference on Distributed Computer and... Read More >>
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling... Read More >>
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
Das Konzept des Buches ist anschaulich und didaktisch fundiert und damit auch sehr gut für den Unterricht an technisch... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Intelligent Technologies... Read More >>