Free Delivery Over $100
34508 books were found.
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM... Read More >>
���� ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE ���� Are you ready to become a master of Active Directory? Look... Read More >>
Il clustering � una delle tecniche pi� importanti del data mining. Ha lo scopo di suddividere i dati in gruppi di... Read More >>
Le regroupement est l'une des techniques les plus importantes dans le domaine de l'exploration des donn�es. Elle... Read More >>
O Clustering � uma das t�cnicas mais importantes na extra��o de dados. O seu objetivo � dividir os dados em grupos... Read More >>
Das Clustering ist eine der wichtigsten Techniken im Data Mining. Sie zielt darauf ab, die Daten in Gruppen �hnlicher... Read More >>
"Discover the complex world of security psychology with ""Internal Paradigm for Affective Responses to Security... Read More >>
"Embark on a transformative journey into the world of the Internet of Things (IoT) with ""Hands-on IoT Solutions... Read More >>
"Dive into the world of cybersecurity with ""Python for Cybersecurity: Analyzing Malware, Exploits, and Tool Development""... Read More >>
As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing,... Read More >>
The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments... Read More >>
Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive... Read More >>
Attualmente, la quantit� di dati memorizzati nei database didattici sta aumentando rapidamente. Questi database... Read More >>
Heutzutage nimmt die Menge der in Bildungsdatenbanken gespeicherten Daten rapide zu. Diese Datenbanken enthalten... Read More >>
� l'heure actuelle, la quantit� de donn�es stock�es dans les bases de donn�es �ducatives augmente rapidement. Ces... Read More >>
This proceedings presents the papers included in the 2nd International Congress of Electrical and Computer Engineering... Read More >>
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took... Read More >>
This book focuses on topics that business managers and project teams in global enterprises need to understand and... Read More >>
This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need... Read More >>
"In an era where cyber threats evolve at an unprecedented pace, ""AI for Network Security"" emerges as a pivotal... Read More >>
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing... Read More >>
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Mobile Networks... Read More >>
Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking... Read More >>