Free Delivery Over $100
34348 books were found.
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference... Read More >>
Read More >>
この本では、クラウド上またはRaspberry Piで自前のVPNサーバーを構築する方法を学ぶことができます この本は、自前のIPsec VPN、OpenVPN、およびWireGuardサーバーを構築するための完全ガイドです。10年間のオープンソースの取り組みと数百万人のユーザーによる使用経験に基づき、この本は自前のVPNを構築するために必要なすべてのことを網羅しています。... Read More >>
This book includes original unpublished contributions presented at the International Conference on Data Analytics... Read More >>
Become a SharePoint power user with this quick-and-easy guide to its many features SharePoint For Dummies is your... Read More >>
この本では、クラウド上またはRaspberry Piで自前のVPNサーバーを構築する方法を学ぶことができます この本は、自前のIPsec... Read More >>
Este é um livro útil para pesquisadores que trabalham com algoritmos LEACH em redes de sensores sem fio. É apresentada... Read More >>
Kommunikationsprotokolle für die Vernetzung in Fahrzeugen sind eine Methode zur Übertragung von Daten zwischen verteilten... Read More >>
Os protocolos de comunicação em redes veiculares são um método para transferir dados entre módulos distribuídos... Read More >>
Dies ist ein nützliches Buch für Forscher, die sich mit LEACH-Algorithmen in drahtlosen Sensornetzwerken beschäftigen.... Read More >>
Questo è un libro utile per i ricercatori che lavorano sugli algoritmi LEACH nelle reti di sensori wireless. Viene... Read More >>
Cet ouvrage est utile pour les chercheurs travaillant sur les algorithmes LEACH dans les réseaux de capteurs sans... Read More >>
I protocolli di comunicazione nelle reti di bordo dei veicoli sono un metodo per trasferire dati tra moduli distribuiti... Read More >>
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and... Read More >>
Prepare for CompTIA CySA+ (CS0-003) exam with this study guide-covering security ops, incident response, and vulnerability... Read More >>
A complete guide to securing the core components of cloud services, with practical, real-world examples using the... Read More >>
This book provides a comprehensive exploration of filesystem management and backup strategies, covering the essential... Read More >>
Learn how the cyber kill chain, a structured model that outlines the stages of a cyberattack, guides you through... Read More >>
Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer... Read More >>