Free Delivery Over $100
34715 books were found.
West's 'CompTIA Cloud+ Guide to Cloud Computing,' 3rd Edition, prepares you for certification exam and career success.... Read More >>
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies... Read More >>
This book constitutes revised selected papers from the 5th International Workshop on Distributed Computing for Emerging... Read More >>
This volume constitutes revised selected papers of the 25th International Conference on Web Engineering, ICWE 2025,... Read More >>
Read More >>
This two-volume set, CCIS 2624 and CCIS 2625,constitutes the refereed proceedings of the 8th China Intelligent Networked... Read More >>
This volume constitutes the refereed proceedings of the 21st IFIP WG 11.9 International Conference on Advances... Read More >>
mso-fareast-language: ZH-CN;"">Specifically, starting from the reference security framework of the industrial internet... Read More >>
A gripping true story about one ransomware attack and the hands-on lessons you can learn from it In Locked Up:... Read More >>
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Software Engineering for... Read More >>
In the ever-evolving world of cybersecurity, the need for robust and proactive threat intelligence has never been... Read More >>
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference... Read More >>
This volume constitutes the proceedings of Third International Conference on Artificial Intelligence of Things and... Read More >>
The integration of artificial intelligence (AI) with Internet of Things (IoT), known as AIoT. It is recognized for... Read More >>
This book provides a comprehensive introduction to printed flexible sensors, covering key aspects such as main materials,... Read More >>
Misconfigured identities are the leading cause of cyber incidents. Organizations are investing significant resources... Read More >>
Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran... Read More >>
In an era where technological behemoths wield unprecedented power over the digital landscape, this book is a call... Read More >>
Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting... Read More >>
The book explores AI model types including Large Language Models and multimodal embeddings alongside reinforcement... Read More >>