Free Delivery Over $100
32863 books were found.
A technical terms glossary and quick-start guide on computer data storage. Short paragraphs per term summarize complex... Read More >>
IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT)... Read More >>
A collection of short articles, covering bulletin board systems (BBS) and dial-up networking. Learn how users went... Read More >>
Calling all SAP developers and admins! If your SAP and non-SAP apps rely on OData, you need this definitive guide... Read More >>
Digital einfach besser geschützt! Wie Sie Ihre Daten zuhause und im Internet vor Betrügern schützen, vermittelt... Read More >>
Read More >>
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for... Read More >>
Architecture Modernization: Socio-technical alignment of software, strategy, and structure guides readers through... Read More >>
"Introducing ""An Ultimate User Guide for Mastering OnePlus 12"" - your indispensable companion to unlocking the... Read More >>
"Empower yourself with the essential practices of Linux security and administration. In ""Linux Security and Administration,""... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, CLOUD 2023,... Read More >>
The main research in this field is to define new algorithms for coding that detects and corrects errors, random... Read More >>
The Clustering is one of the most important technique in data mining. It aims partitioning the data into groups... Read More >>
This book constitutes the revised and selected papers of the International Conference on Global Economic Revolutions... Read More >>
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research... Read More >>
Secured routing with Kronecker Product is a novel approach that combines the concepts of secure routing protocols... Read More >>
This book constitutes the revised selected papers from the 24th International Conference on Information Security... Read More >>
This book discusses understand cybersecurity management in decentralized finance (DeFi). It commences with introducing... Read More >>
"Unlock the potential of Linux with ""Linux Command Lines and Shell Scripting"" by June Walker. This guide demystifies... Read More >>
These two volumes constitute the revised selected papers of the 5th International Conference, CSEI 2023, held in... Read More >>