Free Delivery Over $100
32863 books were found.
This book gathers the proceedings of the 13th International Conference on Frontier Computing, held in Tokyo, on... Read More >>
With the ability to improve security and expedite procedures, facial recognition technology is quickly revolutionizing... Read More >>
La mise sur pied d'un r�seau documentaire local � l'Universit� de Kinshasa a pour objectif, d'une part, de faire... Read More >>
Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft Graph Key... Read More >>
This report aims to inform the Army on how to effectively acquire and develop data analytics capabilities, leveraging... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT... Read More >>
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order... Read More >>
This book presents the security and privacy challenges of the smart home following the logic of “terminal device... Read More >>
"���� Introducing ""Cyber Auditing Unleashed"" - Your Ultimate Guide to Advanced Security Strategies for Ethical... Read More >>
""Features 2 practice tests online, digital flashcards, study tips""--Cover. Read More >>
Electric Machines covers an in-depth analysis of machines augmented with ample examples, which makes it suitable... Read More >>
This book gathers outstanding papers presented at the International Conference on Data Science and Applications... Read More >>
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced,... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Edge Computing, EDGE 2023,... Read More >>
Read More >>
Introducing our Password Book for Seniors - a Personal Internet Organizer created with seniors in mind. This user-friendly... Read More >>
"""Embracing the Fog: Harnessing the Power of Mist Computing,"" the book explores the concept of mist computing,... Read More >>
"The book ""Foggy Horizons: Unraveling the Potential of Fog Computing"" provides a comprehensive exploration of... Read More >>
The ideal, self-contained reference providing in-depth knowledge of magnetic communications written by experts in... Read More >>
Juniper Junos is one of the best products to use it on your network. It is mainly used by ISPs' networks as well... Read More >>
Machine to Machine networks (M2M) is a technology where all the devices worldwide are interconnected through the... Read More >>
This book demonstrates how information security requires a deep understanding of an organization's assets, threats... Read More >>
"Dive into the future of blockchain with ""Empowering a Unified Blockchain Future: Bridging the Gaps with Trustless... Read More >>