Computer networking & communications books

34508 books were found.

Passive and Active Measurement: 25th International Conference, PAM 2024, Virtual Event, March 11–13, 2024, Proceedings, Part I

Passive and Active Measurement: 25th International Conference,...

Author: Philipp Richter ,  Vaibhav Bajpai
ISBN: 9783031562488
Format: Paperback
$316.77

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM...  Read More >>

Passive and Active Measurement: 25th International Conference, PAM 2024, Virtual Event, March 11–13, 2024, Proceedings, Part II

Passive and Active Measurement: 25th International Conference,...

Author: Philipp Richter ,  Vaibhav Bajpai
ISBN: 9783031562518
Format: Paperback
$343.17

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM...  Read More >>

Active Directory: Network Management Best Practices For System Administrators

Active Directory: Network Management Best Practices...

Author: Rob Botwright
ISBN: 9781839386923
Format: Paperback
$105.47

���� ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE ���� Are you ready to become a master of Active Directory? Look...  Read More >>

Approccio Di Data Mining Basato Sullo Stream Mining

Approccio Di Data Mining Basato Sullo Stream Mining...

Author: Shylaja S
ISBN: 9786207272310
Format: Paperback
$126.72

Il clustering � una delle tecniche pi� importanti del data mining. Ha lo scopo di suddividere i dati in gruppi di...  Read More >>

Approche D'exploration De Flux Bas�e Sur L'exploration De Donn�es

Approche D'exploration De Flux Bas�e Sur L'exploration...

Author: Shylaja S
ISBN: 9786207272273
Format: Paperback
$126.72

Le regroupement est l'une des techniques les plus importantes dans le domaine de l'exploration des donn�es. Elle...  Read More >>

Abordagem de Extrac��o de Dados Baseada Na Extrac��o de Fluxos

Abordagem de Extrac��o de Dados Baseada Na Extrac��o...

Author: Shylaja S
ISBN: 9786207272297
Format: Paperback
$126.72

O Clustering � uma das t�cnicas mais importantes na extra��o de dados. O seu objetivo � dividir os dados em grupos...  Read More >>

Data-Mining-Basierter Stream-Mining-Ansatz

Data-Mining-Basierter Stream-Mining-Ansatz

Author: Shylaja S
ISBN: 9786207272266
Format: Paperback
$126.72

Das Clustering ist eine der wichtigsten Techniken im Data Mining. Sie zielt darauf ab, die Daten in Gruppen �hnlicher...  Read More >>

Internal Paradigm For Affective Responses To Security Information

Internal Paradigm For Affective Responses To Security...

Author: Charles Junior
ISBN: 9798869282231
Format: Paperback
$118.80

"Discover the complex world of security psychology with ""Internal Paradigm for Affective Responses to Security...  Read More >>

Hands-on IoT Solutions with MQTT and Node-RED

Hands-on IoT Solutions with MQTT and Node-RED

Author: Matt Mueyon
ISBN: 9798323192205
Format: Paperback
$52.67

"Embark on a transformative journey into the world of the Internet of Things (IoT) with ""Hands-on IoT Solutions...  Read More >>

Python for Cybersecurity: Analyzing Malware, Exploits, and Tool Development

Python for Cybersecurity: Analyzing Malware, Exploits,...

Author: Ted Beacon
ISBN: 9798323135783
Format: Paperback
$52.67

"Dive into the world of cybersecurity with ""Python for Cybersecurity: Analyzing Malware, Exploits, and Tool Development""...  Read More >>

Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective

Secure Coordination Control of Networked Robotic Systems:...

Author: Xiaolei Li ,  Jiange Wang
ISBN: 9789819993581
Format: Hardback
$475.17

As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing,...  Read More >>

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022)

Secure Edge and Fog Computing Enabled AI for IoT and...

Author: Ahmed A. Abd El-Latif ,  Lo’ai Tawalbeh
ISBN: 9783031510960
Format: Hardback
$448.77

The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments...  Read More >>

Machine Learning Techniques for Cybersecurity

Machine Learning Techniques for Cybersecurity

Author: Elisa Bertino ,  Sonam Bhardwaj
ISBN: 9783031282614
Format: Paperback
$103.47

Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive...  Read More >>

Estrazione dei dati con la rete neurale

Estrazione dei dati con la rete neurale

Author: Devesh Katiyar ,  Vinodani Katiyar
ISBN: 9786207435173
Format: Paperback
$100.32

Attualmente, la quantit� di dati memorizzati nei database didattici sta aumentando rapidamente. Questi database...  Read More >>

Data Mining mit Hilfe eines neuronalen Netzes

Data Mining mit Hilfe eines neuronalen Netzes

Author: Devesh Katiyar ,  Vinodani Katiyar
ISBN: 9786207435142
Format: Paperback
$100.32

Heutzutage nimmt die Menge der in Bildungsdatenbanken gespeicherten Daten rapide zu. Diese Datenbanken enthalten...  Read More >>

Exploration de donn�es � l'aide d'un r�seau neuronal

Exploration de donn�es � l'aide d'un r�seau neuronal...

Author: Devesh Katiyar ,  Vinodani Katiyar
ISBN: 9786207435166
Format: Paperback
$100.32

� l'heure actuelle, la quantit� de donn�es stock�es dans les bases de donn�es �ducatives augmente rapidement. Ces...  Read More >>

2nd International Congress of Electrical and Computer Engineering

2nd International Congress of Electrical and Computer...

Author: Muhammet Nuri Seyman
ISBN: 9783031527593
Format: Hardback
$527.97

This proceedings presents the papers included in the 2nd International Congress of Electrical and Computer Engineering...  Read More >>

The Seventh International Conference on Safety and Security with IoT: SaSeIoT 2023

The Seventh International Conference on Safety and Security...

Author: Kim Phuc Tran ,  Shujun Li
ISBN: 9783031530272
Format: Hardback
$422.37

This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took...  Read More >>

Deploying Enterprise Systems: How to Select, Configure, Build, Deploy, and Maintain a Successful ES in Your Organization

Deploying Enterprise Systems: How to Select, Configure,...

Author: David Mattson
ISBN: 9781032464206
Format: Paperback
$96.99

This book focuses on topics that business managers and project teams in global enterprises need to understand and...  Read More >>

AWS Certified Security – Specialty (SCS-C02) Exam Guide: Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt

AWS Certified Security – Specialty (SCS-C02) Exam Guide:...

Author: Adam Book ,  Stuart Scott
ISBN: 9781837633982
Format: Paperback
$118.77

This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need...  Read More >>

AI for Network Security

AI for Network Security

Author: Russ Elektran
ISBN: 9798322968245
Format: Paperback
$52.67

"In an era where cyber threats evolve at an unprecedented pace, ""AI for Network Security"" emerges as a pivotal...  Read More >>

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Applying Artificial Intelligence in Cybersecurity Analytics...

Author: Shilpa Mahajan (The NorthCap University, India) ,  Mehak Khurana (The NorthCap University, India)
ISBN: 9781394196449
Format: Hardback
$207.95

APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing...  Read More >>

Mobile Networks and Management: 13th EAI International Conference, MONAMI 2023, Yingtan, China, October 27-29, 2023, Proceedings

Mobile Networks and Management: 13th EAI International...

Author: Celimuge Wu ,  Xianfu Chen
ISBN: 9783031554704
Format: Paperback
$211.17

This book constitutes the refereed post-conference proceedings of the 13th International Conference on Mobile Networks...  Read More >>

Deploying Enterprise Systems: How to Select, Configure, Build, Deploy, and Maintain a Successful ES in Your Organization

Deploying Enterprise Systems: How to Select, Configure,...

Author: David Mattson
ISBN: 9781032464213
Format: Hardback
$305.00

This book focuses on topics that business managers and project teams in global enterprises need to understand and...  Read More >>

In Zero Trust We Trust

In Zero Trust We Trust

Author: Avinash Naduvath
ISBN: 9780138237400
Format: Paperback
$118.77

Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List