Free Delivery Over $100
10062 books were found.
This book offers the most suitable methods of applying Low-Power Wide-Area Network (LPWAN) technology to conceptual... Read More >>
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud... Read More >>
This Automotive Cybersecurity Engineering Handbook untangles the complexities of building secure automotive products... Read More >>
This book delivers insights into how social science and technology might aid new advancements in managing the complexity... Read More >>
Read More >>
Print Textbook & Cloud Lab Access: 180-day subscription.The cybersecurity Cloud Labs for Ethical Hacking: Techniques,... Read More >>
the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle... Read More >>
Unlock Your IT Potential: The Definitive CompTIA Certification Study Guide & Test Prep, Master Your IT Journey:... Read More >>
This book constitutes the proceedings of the BPM Forum held at the 21st International Conference on Business Process... Read More >>
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe... Read More >>
Step into a world where art meets artificial intelligence, imagination merges with algorithms, and creativity knows... Read More >>
Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In... Read More >>
This book will help you to design, develop, and operate security controls on Google Cloud as well as discover best... Read More >>
"In our rapidly evolving digital world, the importance of cyber security cannot be overstated. With every click,... Read More >>
A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity.... Read More >>
This book features high-quality research papers presented at the 5th International Conference on Computational Intelligence... Read More >>
Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure... Read More >>
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards... Read More >>
The research contained in the book fits well into the larger body of work on various aspects of wireless networks... Read More >>