Free Delivery Over $100
32863 books were found.
Providing a comprehensive overview of the modelling of complex systems, with particular emphasis on the collective... Read More >>
"Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams... Read More >>
This book offers an overview of digital, IoT and intelligent technologies, applications and solutions that are contributing... Read More >>
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the... Read More >>
PowerShell Essentials - Your path to efficient automation and scripting DESCRIPTION In the last decade,... Read More >>
"The Definitive Guide to Bluetooth Low Energy-fully updated Unlock the Power of Bluetooth Low Energy! Do you... Read More >>
This book constitutes the refereed proceedings of the 19th International Symposium on Bioinformatics Research and... Read More >>
"In ""Bug Bounty Safari: Exploring the Wild World of Cybersecurity Rewards,"" author Juan Lane takes readers on... Read More >>
"""IT Networking: A Comprehensive Guide"" is a detailed resource designed to help IT professionals, students, and... Read More >>
This book constitutes the refereed proceedings of the 19th European Workshop on Computer Performance Engineering,... Read More >>
Become a cloud developer â "" and have fun doing it! This full-color guide will help you start creating cloud-based... Read More >>
To help aspiring IT professionals succeed in the automation field, ""Learning Ansible"" provides an in-depth primer... Read More >>
"In the ever-evolving battlefield of cyberspace, where digital adversaries lurk around every corner, there exists... Read More >>
"""Een complete gids voor Linux"" is het ultieme naslagwerk voor iedereen die wil leren werken met het Linux-besturingssysteem,... Read More >>
The authors combined quantitative and qualitative modes of analysis to better understand and anticipate flashpoints... Read More >>
This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The... Read More >>
This book collects contributions of forefront research and practices related to the use of the enabling technologies... Read More >>
This book constitutes the refereed proceedings of the 10th International Workshop on Ophthalmic Medical Image Analysis,... Read More >>
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and... Read More >>
Edge Computing Technology and Applications by veteran technologist Perry Lea slices through the buzzwords and reveals... Read More >>
This book aims to provide a roadmap for semantic technologies and highlights the role of these technologies in industry,... Read More >>
Metaverse Communication and Computing Networks Understand the future of the Internet with this wide-ranging analysis... Read More >>
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on... Read More >>
This book aims at developing a reader’s thorough understanding of the challenges and opportunities of two categories... Read More >>