Free Delivery Over $100
32857 books were found.
There are essential questions surrounding Africa's digitalization journey, including whether or not the continent... Read More >>
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. Read More >>
This book is aimed at students and managers who seek detailed insights into contemporary knowledge management. It... Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
This book constitutes the thoroughly refereed and revised selected papers from the 12th International Conference... Read More >>
Das Konzept des Buches ist anschaulich und didaktisch fundiert und damit auch sehr gut für den Unterricht an technisch... Read More >>
This book consolidates the research relating to the security in SDN, CSDN, and Hybrid SDNs. The security enhancements... Read More >>
Read More >>
Mastering Linux Administration, this book will help you become a proficient sysadmin and quickly adapt to the challenges... Read More >>
"""Exploring Connectivity Patterns: Graph Theory in Chemistry"" by Jon Martin is an illuminating exploration into... Read More >>
"""Sbloccare la Blockchain: Innovations for Tomorrow's World"" offre un'esplorazione completa della tecnologia blockchain... Read More >>
"Le livre ""Unlocking the Blockchain: Innovations for Tomorrow's World"" propose une exploration compl�te de la... Read More >>
"""Unlocking the Blockchain: Innovationen f�r die Welt von morgen"" bietet eine umfassende Erkundung der Blockchain-Technologie... Read More >>
"""Unlocking the Blockchain: Innovations for Tomorrow's World"" fornece uma explora��o abrangente da tecnologia... Read More >>
Ethics in Online AI-Based Systems: Risks and Opportunities in Current Technological Trends creates a space to explore... Read More >>
���� ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE ���� Are you ready to become a master of Active Directory? Look... Read More >>
"""A Guide on iPhone Security"" ist ein unverzichtbarer Leitfaden, der sich durch das Labyrinth der iPhone-Sicherheit... Read More >>
This guide introduces you to the key elements of the Europrivacy(TM)/(R). Read More >>
Il clustering � una delle tecniche pi� importanti del data mining. Ha lo scopo di suddividere i dati in gruppi di... Read More >>
Le regroupement est l'une des techniques les plus importantes dans le domaine de l'exploration des donn�es. Elle... Read More >>