Free Delivery Over $100
33580 books were found.
To promote the MU (Multi-User) communications in High-Efficiency WLANs, the new IEEE 802.11ax standard introduced... Read More >>
"Il libro ""Foggy Horizons: Unraveling the Potential of Fog Computing"" offre un'esplorazione completa del fog computing,... Read More >>
"""Embracing the Fog: Harnessing the Power of Mist Computing"", o livro explora o conceito de computa��o em n�voa,... Read More >>
"Das Buch ""Embracing the Fog: Harnessing the Power of Mist Computing"" untersucht das Konzept des Mist Computing,... Read More >>
"O livro ""Foggy Horizons: Unraveling the Potential of Fog Computing"" fornece uma explora��o abrangente da computa��o... Read More >>
"Le livre ""Foggy Horizons: Unraveling the Potential of Fog Computing"" propose une exploration compl�te du fog... Read More >>
"""Embracing the Fog: Harnessing the Power of Mist Computing"",... Read More >>
"Das Buch ""Foggy Horizons: Unraveling the Potential of Fog Computing"" bietet eine umfassende Untersuchung von... Read More >>
"Intitul� ""Embracing the Fog: Harnessing the Power of Mist Computing"", ce livre explore le concept de ""mist computing"",... Read More >>
Die Computerkriminalit�t hat zugenommen, und es wird nach staatlichen oder privaten Unternehmen gesucht, die nicht... Read More >>
Si � assistito a un aumento della criminalit� informatica e alla ricerca di beni governativi o di aziende private... Read More >>
Наблюдается рост киберпреступности и поиск активов государственных или частных компаний, которые не обеспечивают... Read More >>
There has been an increase in cybercrime and a search for government or private company assets that have failed... Read More >>
On assiste � une augmentation de la cybercriminalit� et � la recherche d'actifs gouvernementaux ou d'entreprises... Read More >>
Read More >>
La rete di sensori wireless (WSN) � considerata una tecnologia in via di sviluppo per colmare il divario tra il... Read More >>
Mobile Ad-hoc-Netzwerke (MANETs) sind dezentralisierte Multi-Hop-Netzwerke, in denen die Zwischenknoten als Router... Read More >>
This book brings together chapters from leading world experts that signpost the way forward for industry and commerce... Read More >>
There are essential questions surrounding Africa's digitalization journey, including whether or not the continent... Read More >>
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling... Read More >>
"""Seventy-five percent of organizations worldwide reported an attempted business email compromise attack last year.""... Read More >>
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
Das Konzept des Buches ist anschaulich und didaktisch fundiert und damit auch sehr gut für den Unterricht an technisch... Read More >>
Bitcoin con Rigor: Un estudio sobre el funcionamiento t�cnico de Bitcoin Desentra�ando Bitcoin En un mundo digital... Read More >>