Free Delivery Over $100
34831 books were found.
In this book, we will provide an overview of the fundamental concepts of Edge Computing, Edge intelligence using... Read More >>
Develop a comprehensive understanding of IoT product development using ESP32 microcontrollers. This book takes readers... Read More >>
Die Arbeit evaluiert die praktische Effektivität und Schlüssigkeit des europäischen Datenschutzrechts in Bezug auf... Read More >>
This book presents high-quality research papers presented at Congress on Smart Computing Technologies (CSCT 2024)... Read More >>
This book offers a comprehensive exploration of the integration of Big Data analytics into the management of energy... Read More >>
This book presents a comprehensive exploration of federated learning and its transformative potential across industries,... Read More >>
Docker Deep Dive: Master Containerization, Kubernetes, and Production Deployment is your ultimate step-by-step guide... Read More >>
The traditional ""castle-and-moat"" approach to network security is obsolete. In a world where the perimeter has... Read More >>
This hands-on guide takes you from setting up Pulumi to building scalable, testable, and secure infrastructure projects.... Read More >>
The purpose of the Historical Review of the Communications Unit is to promote the analysis of the ethical and responsible... Read More >>
Celem Przeglądu Historii Jednostek Lącz ności jest promowanie analizy etycznego i odpowiedzialnego wykorzystania... Read More >>
Lo scopo della Communications Unit History Review è quello di promuovere l'analisi sull'uso etico e responsabile... Read More >>
O objetivo da Revista Histórica da Unidade de Comunicações é promover a análise sobre a utilização ética e responsável... Read More >>
L'objectif de la revue historique de l'Unité des communications est de promouvoir l'analyse de l'utilisation éthique... Read More >>
Transform your cloud security expertise with the most comprehensive guide to multi-cloud security enhanced by artificial... Read More >>
Der Zweck der Communications Unit History Review besteht darin, die Analyse des ethischen und verantwortungsvollen... Read More >>
Mit der zunehmenden Verbreitung der drahtlosen Kommunikation tauchen auch neue Arten von Angriffen auf. Eine davon... Read More >>
Das Verständnis der Funktionen jeder einzelnen Schicht des OSI-Referenzmodells ist sehr wichtig, wenn es um die... Read More >>
Com o aumento das comunicações sem fios, surgem novos tipos de ataques. Um deles é o ataque de phishing. Um algoritmo... Read More >>
Con l'aumento delle comunicazioni wireless, stanno comparendo nuovi tipi di attacchi. Uno di questi è l'attacco... Read More >>
Zrozumienie funkcji każdej z warstw modelu referencyjnego OSI jest bardzo ważne przy rozwiązywaniu problemów związanych... Read More >>
Comprendere le funzioni di ciascuno dei livelli del modello di riferimento OSI è molto importante quando si tratta... Read More >>
Compreender as funções de cada uma das camadas do Modelo de Referência OSI é muito importante quando se trata de... Read More >>
Wraz z rozwojem komunikacji bezprzewodowej pojawiają się nowe rodzaje ataków. Jednym z nich jest atak phishingowy.... Read More >>
Il est très important de comprendre les fonctions de chacune des couches du modèle de référence OSI pour dépanner... Read More >>