Free Delivery Over $100
32863 books were found.
O Clustering � uma das t�cnicas mais importantes na extra��o de dados. O seu objetivo � dividir os dados em grupos... Read More >>
Das Clustering ist eine der wichtigsten Techniken im Data Mining. Sie zielt darauf ab, die Daten in Gruppen �hnlicher... Read More >>
"Discover the complex world of security psychology with ""Internal Paradigm for Affective Responses to Security... Read More >>
"Embark on a transformative journey into the world of the Internet of Things (IoT) with ""Hands-on IoT Solutions... Read More >>
"Dive into the world of cybersecurity with ""Python for Cybersecurity: Analyzing Malware, Exploits, and Tool Development""... Read More >>
As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing,... Read More >>
The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments... Read More >>
Attualmente, la quantit� di dati memorizzati nei database didattici sta aumentando rapidamente. Questi database... Read More >>
Heutzutage nimmt die Menge der in Bildungsdatenbanken gespeicherten Daten rapide zu. Diese Datenbanken enthalten... Read More >>
� l'heure actuelle, la quantit� de donn�es stock�es dans les bases de donn�es �ducatives augmente rapidement. Ces... Read More >>
Read More >>
This book focuses on topics that business managers and project teams in global enterprises need to understand and... Read More >>
This proceedings presents the papers included in the 2nd International Congress of Electrical and Computer Engineering... Read More >>
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took... Read More >>
"In an era where cyber threats evolve at an unprecedented pace, ""AI for Network Security"" emerges as a pivotal... Read More >>
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Mobile Networks... Read More >>
Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking... Read More >>
This book examines the ways in which the future learners of today can be educated. It covers digital learning strategies... Read More >>
In 'Connected through Chaos: Telecommunications Resilience Strategies', Anshul Yadav, a telecom professional, unveils... Read More >>
La transition d'IPv4 � IPv6 est l'une des composantes les plus cruciales de tous les r�seaux et installations de... Read More >>
Der �bergang von IPv4 zu IPv6 ist eine der wichtigsten Komponenten aller aufkommenden Netzwerke und Kommunikationseinrichtungen.... Read More >>
A transi��o do IPv4 para o IPv6 � um dos componentes mais cruciais de todas as redes e instala��es de comunica��o... Read More >>
Die sichere Gruppenkommunikation hat aufgrund ihrer interessanten und vielversprechenden Funktionen wie Video-on-Demand,... Read More >>