Free Delivery Over $100
34508 books were found.
Este livro explora as adaptações genéticas das populações que vivem em ambientes de altitude elevada e as doenças... Read More >>
Ce livre explore les adaptations génétiques des populations vivant dans des environnements de haute altitude et... Read More >>
Les réseaux mobiles ad hoc (MANET) sont un ensemble de deux noeuds ou plus qui peuvent communiquer entre eux sans... Read More >>
Mobile Ad-hoc-Netzwerke (MANETs) sind eine Ansammlung von zwei oder mehr Knoten, die ohne die Hilfe von Netzwerkinfrastrukturen... Read More >>
Read More >>
This book discusses the problems of Physical Layer Security (PLS) in Intelligent Reflecting Surface (IRS)-assisted... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Advanced Communication... Read More >>
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and... Read More >>
Wie wir alle wissen, reduziert der architektonische Rahmen von Software-defined Networking (SDN) die Arbeit von... Read More >>
Come è noto, il quadro architetturale del software-defined networking (SDN) riduce il lavoro dei gestori di rete... Read More >>
Como todos sabemos, a estrutura arquitetónica das redes definidas por software (SDN) reduz o trabalho dos gestores... Read More >>
Comme nous le savons tous, le cadre architectural des réseaux définis par logiciel (SDN) réduit le travail des gestionnaires... Read More >>
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation... Read More >>
I metodi convenzionali utilizzati per la verifica delle firme in batch non distinguono tra la verifica delle firme... Read More >>
Foi realizada uma quantidade significativa de investigação para avaliar o desempenho dos sistemas de deteção de... Read More >>
Les méthodes conventionnelles utilisées pour la vérification des signatures par lots ne font pas de distinction... Read More >>
Herkömmliche Methoden, die bei der Batch-Signaturprüfung eingesetzt werden, unterscheiden nicht zwischen der Signaturprüfung... Read More >>
Sono state condotte numerose ricerche per valutare le prestazioni dei sistemi di rilevamento delle intrusioni di... Read More >>
Es wurden zahlreiche Forschungsarbeiten durchgeführt, um die Leistung von Network Intrusion Detection System (NIDS)... Read More >>
Os métodos convencionais utilizados na verificação de assinaturas em lote não fazem distinção entre a verificação... Read More >>
Providing a comprehensive overview of the modelling of complex systems, with particular emphasis on the collective... Read More >>
"Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams... Read More >>
This book offers an overview of digital, IoT and intelligent technologies, applications and solutions that are contributing... Read More >>