Free Delivery Over $100
33310 books were found.
"""Securing the Cloud: Fortifying Digital Skies"" � um guia abrangente que investiga os meandros da seguran�a na... Read More >>
"""Proteggere il cloud: Fortifying Digital Skies"" � una guida completa che approfondisce le complessit� della sicurezza... Read More >>
Offers a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone industry.... Read More >>
The interaction of various service models, including edge computing and cloud computing, are quickly changing to... Read More >>
Social media is a pivotal force shaping business strategies and entrepreneurship. The rapid evolution of social... Read More >>
Transform the way your network teams think about and deploy enterprise network automation through the power of Nautobot's... Read More >>
In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals... Read More >>
Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies... Read More >>
Read More >>
In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing... Read More >>
The technology evolution in education can no longer be apprehended simply by looking at the use of computers and... Read More >>
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information... Read More >>
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference... Read More >>
A rigorous new framework for understanding the world of the future Information technology is evolving at a truly... Read More >>
This book gathers outstanding papers presented at the International Conference on Data Science and Applications... Read More >>
Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life... Read More >>
A practical guide to vulnerability assessment and mitigation with PowerShell Key Features Leverage PowerShell's... Read More >>
"Il libro ""Foggy Horizons: Unraveling the Potential of Fog Computing"" offre un'esplorazione completa del fog computing,... Read More >>
"""Embracing the Fog: Harnessing the Power of Mist Computing"", o livro explora o conceito de computa��o em n�voa,... Read More >>
"Das Buch ""Embracing the Fog: Harnessing the Power of Mist Computing"" untersucht das Konzept des Mist Computing,... Read More >>
"O livro ""Foggy Horizons: Unraveling the Potential of Fog Computing"" fornece uma explora��o abrangente da computa��o... Read More >>