Free Delivery Over $100
34508 books were found.
"The book ""Foggy Horizons: Unraveling the Potential of Fog Computing"" provides a comprehensive exploration of... Read More >>
Read More >>
The ideal, self-contained reference providing in-depth knowledge of magnetic communications written by experts in... Read More >>
Juniper Junos is one of the best products to use it on your network. It is mainly used by ISPs' networks as well... Read More >>
Machine to Machine networks (M2M) is a technology where all the devices worldwide are interconnected through the... Read More >>
This book demonstrates how information security requires a deep understanding of an organization's assets, threats... Read More >>
"Dive into the future of blockchain with ""Empowering a Unified Blockchain Future: Bridging the Gaps with Trustless... Read More >>
A technical terms glossary and quick-start guide on computer data storage. Short paragraphs per term summarize complex... Read More >>
IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT)... Read More >>
A collection of short articles, covering bulletin board systems (BBS) and dial-up networking. Learn how users went... Read More >>
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing... Read More >>
Calling all SAP developers and admins! If your SAP and non-SAP apps rely on OData, you need this definitive guide... Read More >>
Digital einfach besser geschützt! Wie Sie Ihre Daten zuhause und im Internet vor Betrügern schützen, vermittelt... Read More >>
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for... Read More >>
Architecture Modernization: Socio-technical alignment of software, strategy, and structure guides readers through... Read More >>
"Introducing ""An Ultimate User Guide for Mastering OnePlus 12"" - your indispensable companion to unlocking the... Read More >>
"Empower yourself with the essential practices of Linux security and administration. In ""Linux Security and Administration,""... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, CLOUD 2023,... Read More >>
The main research in this field is to define new algorithms for coding that detects and corrects errors, random... Read More >>
The Clustering is one of the most important technique in data mining. It aims partitioning the data into groups... Read More >>
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research... Read More >>
Secured routing with Kronecker Product is a novel approach that combines the concepts of secure routing protocols... Read More >>