Free Delivery Over $100
32863 books were found.
This book features selected papers presented at the 5th International Conference on Recent Innovations in Computing... Read More >>
Read More >>
Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences... Read More >>
Machine learning algorithms allow computers to learn without being explicitly programmed. and adversarial training,... Read More >>
This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best... Read More >>
Understand the core concepts related to inter-service communication. Learn and understand different inter-service... Read More >>
Il clustering � una delle principali tecniche di data mining utilizzate per classificare o suddividere i dati in... Read More >>
Le clustering est l'une des principales techniques d'exploration de donn�es utilis�es pour classer ou partitionner... Read More >>
Clustering ist eine der wichtigsten Data-Mining-Techniken zur Klassifizierung oder Partitionierung von Daten in... Read More >>
O agrupamento � uma das principais t�cnicas de extra��o de dados utilizada para classificar ou dividir os dados... Read More >>
Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly... Read More >>
This book gathers extended versions of papers presented at DoSIER 2023 (Fifth Doctoral Symposium on Intelligence... Read More >>
Dieses Buch gibt umfassende und pragmatische Handlungsempfehlungen für die sich gerade in den letzten Jahren immer... Read More >>
Design, build, and secure scalable machine learning (ML) systems to solve real-world business problems with Python... Read More >>
�BER DAS BUCH Bereiten Sie sich auf die ServiceNow Certified System Administrator (CSA)-Pr�fung(R) vor? Dieses Buch... Read More >>
This book is written to explain the concept of VANETs, its different characteristics and the challenges it faces... Read More >>
This book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating... Read More >>
Understanding and employing cryptography has become central for securing virtually any digital application, whether... Read More >>
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of... Read More >>
"Sum�rgete en el enigm�tico mundo del espionaje cibern�tico con ""C�digos de Sombras: El Maestro Esp�a de la Era... Read More >>
La convergence de l'Internet des objets (IoT) et des technologies Blockchain a ouvert la voie � des innovations... Read More >>