Free Delivery Over $100
33586 books were found.
A comprehensive overview of key concepts and technical details of Zero Trust CNAPP (Cloud Native Application Protection... Read More >>
"As AI is increasingly taking on our lives, we see around us a number of artificially intelligent computing systems.... Read More >>
This book constitutes the refereed proceedings of the 31st International Conference on Inductive Logic Programming,... Read More >>
Read More >>
The convergence of Internet of Things (IoT) and Blockchain technologies has paved the way for transformative innovations... Read More >>
"In the rapidly evolving landscape of containerization, securing Docker containers has become an essential aspect... Read More >>
���� ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE ���� Are you ready to become a master of Active Directory? Look... Read More >>
This guide introduces you to the key elements of the Europrivacy(TM)/(R). Read More >>
Il clustering � una delle tecniche pi� importanti del data mining. Ha lo scopo di suddividere i dati in gruppi di... Read More >>
Le regroupement est l'une des techniques les plus importantes dans le domaine de l'exploration des donn�es. Elle... Read More >>
O Clustering � uma das t�cnicas mais importantes na extra��o de dados. O seu objetivo � dividir os dados em grupos... Read More >>
Das Clustering ist eine der wichtigsten Techniken im Data Mining. Sie zielt darauf ab, die Daten in Gruppen �hnlicher... Read More >>
"Discover the complex world of security psychology with ""Internal Paradigm for Affective Responses to Security... Read More >>
"Embark on a transformative journey into the world of the Internet of Things (IoT) with ""Hands-on IoT Solutions... Read More >>
"Dive into the world of cybersecurity with ""Python for Cybersecurity: Analyzing Malware, Exploits, and Tool Development""... Read More >>
This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need... Read More >>
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing... Read More >>
"In an era where cyber threats evolve at an unprecedented pace, ""AI for Network Security"" emerges as a pivotal... Read More >>
Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutionized... Read More >>
This book examines the ways in which the future learners of today can be educated. It covers digital learning strategies... Read More >>
In 'Connected through Chaos: Telecommunications Resilience Strategies', Anshul Yadav, a telecom professional, unveils... Read More >>
The six-volume set LNCS 14608, 14609, 14609, 14610, 14611, 14612 and 14613 constitutes the refereed proceedings... Read More >>