Free Delivery Over $100
33578 books were found.
Si tratta di osservare la diversit� dei contenuti della tassonomia e dei metodi di costruzione esistenti, secondo... Read More >>
Es geht darum, die Vielfalt der Inhalte der Taxonomie und ihrer Konstruktionsmethoden in den verschiedenen Quellen... Read More >>
Read More >>
A comprehensive overview of key concepts and technical details of Zero Trust CNAPP (Cloud Native Application Protection... Read More >>
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed... Read More >>
"As AI is increasingly taking on our lives, we see around us a number of artificially intelligent computing systems.... Read More >>
This book constitutes the refereed proceedings of the 31st International Conference on Inductive Logic Programming,... Read More >>
The convergence of Internet of Things (IoT) and Blockchain technologies has paved the way for transformative innovations... Read More >>
���� ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE ���� Are you ready to become a master of Active Directory? Look... Read More >>
This guide introduces you to the key elements of the Europrivacy(TM)/(R). Read More >>
Il clustering � una delle tecniche pi� importanti del data mining. Ha lo scopo di suddividere i dati in gruppi di... Read More >>
Le regroupement est l'une des techniques les plus importantes dans le domaine de l'exploration des donn�es. Elle... Read More >>
O Clustering � uma das t�cnicas mais importantes na extra��o de dados. O seu objetivo � dividir os dados em grupos... Read More >>
Das Clustering ist eine der wichtigsten Techniken im Data Mining. Sie zielt darauf ab, die Daten in Gruppen �hnlicher... Read More >>
"Discover the complex world of security psychology with ""Internal Paradigm for Affective Responses to Security... Read More >>
This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need... Read More >>
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing... Read More >>
"In an era where cyber threats evolve at an unprecedented pace, ""AI for Network Security"" emerges as a pivotal... Read More >>
"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no... Read More >>
Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutionized... Read More >>
This book examines the ways in which the future learners of today can be educated. It covers digital learning strategies... Read More >>