Free Delivery Over $100
32863 books were found.
The research contained in the book fits well into the larger body of work on various aspects of wireless networks... Read More >>
Read More >>
The authors examine Ukrainian civilians' contributions to support Ukraine's defense against Russia's full-scale... Read More >>
Create an IT strategy for your company with this book.In seven consecutive steps, this book presents the development... Read More >>
This book provides an understanding of the evolution of digitization in our day to day life and how it has become... Read More >>
""" Identity and Access Management (IAM) Architect: A Practice Guide"" is a comprehensive resource that delves into... Read More >>
Recent combinations of Semantic Technology and Artificial Intelligence presents new techniques to build intelligent... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th International Workshop on Reproducible... Read More >>
This book constitutes the proceedings of the 22nd IFIP WG 8.5 International Conference on Electronic Government,... Read More >>
This book gives readers an overview about technologies that are useful for developments related to Smart Cities.... Read More >>
This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2023),... Read More >>
This six-volume set of LNCS 14187, 14188, 14189, 14190, 14191 and 14192 constitutes the refereed proceedings of... Read More >>
The volume covers topics, including big data and analytics, cloud security and privacy, data intelligence, hardware... Read More >>
Security engineering for embedded and Cyber-physical systems is an invaluable resource to discover cybersecurity... Read More >>
The intelligent decision support, earlier detection of spare part failure, fatigue detection is the main slices... Read More >>
Organizations, especially governments, should be involved in digital transformation, which takes digitalization... Read More >>
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides... Read More >>
"""In this report, the authors use 11 case studies to create a typology of the barriers that impede U.S. security... Read More >>