Free Delivery Over $100
32863 books were found.
On assiste � une augmentation de la cybercriminalit� et � la recherche d'actifs gouvernementaux ou d'entreprises... Read More >>
"Les r�seaux mobiles ad hoc (MANET) sont des r�seaux d�centralis�s et multi-sauts dans lesquels les noeuds interm�diaires... Read More >>
As redes m�veis ad-hoc (MANET) s�o redes descentralizadas e multi-hop onde os n�s interm�dios actuam como routers... Read More >>
La rete di sensori wireless (WSN) � considerata una tecnologia in via di sviluppo per colmare il divario tra il... Read More >>
Heutzutage sind mobile Ger�te mit mehreren Netzwerkschnittstellen ausgestattet. Multihoming bedeutet, dass ein Ger�t... Read More >>
Oggi i dispositivi mobili sono dotati di pi� interfacce di rete. Per multihoming si intende un dispositivo connesso... Read More >>
Atualmente, os dispositivos m�veis est�o equipados com m�ltiplas interfaces de rede. O multihoming refere-se a um... Read More >>
De nos jours, les appareils mobiles sont �quip�s de plusieurs interfaces r�seau. Le multihoming d�signe un appareil... Read More >>
Mobile Ad-hoc-Netzwerke (MANETs) sind dezentralisierte Multi-Hop-Netzwerke, in denen die Zwischenknoten als Router... Read More >>
Replicate and synchronize data between different systems with SAP LT Replication Server! With information on monitoring... Read More >>
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth,... Read More >>
This book brings together chapters from leading world experts that signpost the way forward for industry and commerce... Read More >>
"""Seventy-five percent of organizations worldwide reported an attempted business email compromise attack last year.""... Read More >>
The Full-Duplex radio transmission technique is a prominent feature in the physical layer of the new IEEE 802.11ax... Read More >>
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling... Read More >>
Entdecken Sie ""Enterprise Architektur entschlüsselt: Ein praxisorientierter Leitfaden von den Grundlagen bis zur... Read More >>
Read More >>
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
This series of books is a result of collaboration between the Chinese Academy of Sciences and relevant national... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Intelligent Technologies... Read More >>
The six-volume set LNCS 14608, 14609, 14609, 14610, 14611, 14612 and 14613 constitutes the refereed proceedings... Read More >>
Questo studio intende contribuire a una maggiore disponibilit� di componenti stateful singleton con sessioni utente... Read More >>
Diese Studie soll dazu beitragen, die Verf�gbarkeit von zustandsbehafteten Singleton-Komponenten zu erh�hen, wenn... Read More >>