Free Delivery Over $100
33301 books were found.
Read More >>
Il s'agit d'observer la diversit� des contenus sur la taxonomie et les m�thodes de construction existantes, selon... Read More >>
It is a question of observing the diversity of content on taxonomy and its existing construction methods, according... Read More >>
Речь идет о наблюдении за разнообразием контента по таксономии и существующими методами ее построения, согласно... Read More >>
Explores the foundational elements of the Internet of Things, delving into the convergence of IoT and smart city... Read More >>
Provides a comprehensive exploration of the fundamental concepts, characteristics, challenges, applications, and... Read More >>
Covering topics such as network architectures, protocols, security, and wireless networking, this text explores... Read More >>
Covering various topics including the architecture of distributed systems, communication protocols, distributed... Read More >>
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography... Read More >>
"""Securing the Cloud: Fortifying Digital Skies"" est un guide complet qui se penche sur les subtilit�s de la s�curit�... Read More >>
"""Securing the Cloud: Fortifying Digital Skies"" ist ein umfassender Leitfaden, der sich mit den Feinheiten der... Read More >>
"""Securing the Cloud: Fortifying Digital Skies"" � um guia abrangente que investiga os meandros da seguran�a na... Read More >>
"""Proteggere il cloud: Fortifying Digital Skies"" � una guida completa che approfondisce le complessit� della sicurezza... Read More >>
Offers a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone industry.... Read More >>
The interaction of various service models, including edge computing and cloud computing, are quickly changing to... Read More >>
Social media is a pivotal force shaping business strategies and entrepreneurship. The rapid evolution of social... Read More >>
In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals... Read More >>
Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies... Read More >>
In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing... Read More >>
The technology evolution in education can no longer be apprehended simply by looking at the use of computers and... Read More >>