Free Delivery Over $100
32881 books were found.
This book presents parts of the iM3F 2022 proceedings from the mechatronics as well as the intelligent manufacturing... Read More >>
Read More >>
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops... Read More >>
This book provides detailed and practical information for practitioners to understand why they should choose certification.... Read More >>
This book covers the theory, design and applications of computer networks, distributed computing and information... Read More >>
This textbook provides an exhaustive exploration of Opportunistic Networks (OppNets). Read More >>
Exploring the trends of cooperative competition among traditional micro, small, and medium-sized enterprises, this... Read More >>
Intermediate user level Read More >>
This practical book provides a detailed explanation of the zero trust security model. The updated edition offers... Read More >>
Master a holistic approach to NetDevOps—from concepts to practical implementation This is your comprehensive,... Read More >>
The book conveys current approaches to digitization in companies and shows how digitization projects can be successfully... Read More >>
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important... Read More >>
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International... Read More >>
Supply chains are experiencing a seismic shift towards customer-centricity and sustainability and the challenges... Read More >>
The only authorized Lab Manual for the Cisco Networking Academy Networking Essentials Version 3 Course The... Read More >>
This book focuses on the utilization of GoldenGate Services (GGS) in conjunction with a microservices architecture... Read More >>
"All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges,... Read More >>
The interaction of various service models, including edge computing and cloud computing, are quickly changing to... Read More >>
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity... Read More >>
The book examines virtual machine placement techniques and task scheduling techniques that optimize resource utilization... Read More >>
This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure... Read More >>
This volume constitutes the refereed proceedings of the Second International Conference on Computing, Communication... Read More >>