-
Cyberwarfare: Information Operations in a Connected World
Ingram 出版Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefie
-
Computer Security and the Internet
Springer 出版This book provides a concise yet comprehensive overview of computer and Internet security, suitable
-
Ransomware Protection Playbook
Wiley 出版Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Gl
-
Modeling and Optimization in Software-Defined Networks
This book provides a quick reference and insights into modeling and optimization of software-define
-
Modeling and Optimization in Software-Defined Networks
This book provides a quick reference and insights into modeling and optimization of software-define
-
Artificial Neural Networks: Methods and Applications in Fractional Order Systems
This is the first book that uses Artificial Neural Networks (ANN) to solve fractional order systems
-
Cwap-404
This book is a study guide for the CWAP-404 exam and a reference guide to help you master 802.11 wi
-
Don't Wait, Create
What do Justin Bieber, Lilly Singh, and Andy Samberg have in common? They all launched their career
-
-
Qualit矇 de Service et Performance des R矇seaux Sans Fil IEEE 802.11ac
La couche PHY IEEE 802.11ac vise ? atteindre le tr癡s haut d矇bit en utilisant principalement les can
-
Casp+ Comptia Advanced Security Practitioner Certification Kit
Ingram 出版Prepare for test success with this all-in-one CASP+ Certification Kit! The kit includes: CASP+ Stu
-
A Collection of Applications of Blockchain in Vehicular Ad Hoc Network
In this book, the extra-ordinary services of blockchain are presented to provide a decentralized an
-
Facebook Marketing
Hai un Personal Brand e vuoi sfruttare l'enorme potenzialit? delle Facebook ADS? Ti stai approccian
-
Fight Fire with Fire
Wiley 出版Organizations around the world are in a struggle for survival, racing to transform themselves in a
-
Configure an enterprise network
Today, the sharing of information is becoming more and more an activity in full effervescence, henc
-
Impostazione di una rete aziendale
Oggi, la condivisione delle informazioni sta diventando sempre pi羅 un'attivit? in piena effervescen
-
Einrichtung eines Unternehmensnetzwerks
Heutzutage wird der Austausch von Informationen immer mehr zu einer Aktivit瓣t, die in vollem Gange
-
-
Video Blogging
Ingram 出版Video Blogging: The Essential Guide On How You Can VLOG Your Way to Millions, Discover the Ways on
-
Technical Blogging
Ingram 出版Technical Blogging: The Ultimate Guide To Blogging for Beginners, Learn the Secrets and Strategies
-
Verstehen von WebX-Technologien
Die Gewinnung eines Kunden ist die wichtigste Aktivit瓣t, die ein Unternehmen in die Wege leiten kan
-
Comprendre les technologies WebX
Acqu矇rir un client est l'activit矇 la plus importante qu'une organisation puisse entreprendre. L'inn
-
L’enseignement bas矇 sur les activit矇s (ABI) pour un enseignement significatif des math矇matiques
Ce livre a 矇t矇 pr矇par矇 sur la base du projet de recherche de l'auteur intitul矇 Activity Based Instr
-
Handlungsorientierter Unterricht (ABI) f羹r einen sinnvollen Mathematikunterricht
Dieses Buch wurde auf der Grundlage des Master-Forschungsprojekts des Autors mit dem Titel Activity
-
Compreender as tecnologias WebX
Adquirir um cliente 矇 a actividade mais importante que uma organiza癟瓊o pode iniciar. A cont穩nua ino
-
Instru癟瓊o Baseada em Actividades (ABI) para o Ensino de Matem獺tica Significativa
Este livro 矇 preparado com base no projecto de investiga癟瓊o de mestrado do autor intitulado Activit
-
Comprendere le tecnologie WebX
L'acquisizione di un cliente 癡 l'attivit? pi羅 importante che un'organizzazione pu簷 iniziare. La con
-
Istruzione basata sulle attivit? (ABI) per un insegnamento significativo della matematica
Questo libro 癡 preparato sulla base del progetto di ricerca dell'autore intitolato Activity Based I
-
R矇seaux WLANs IEEE 802.11
Ce livre est consacr矇 ? l'矇valuation de performances et ? l'optimisation de fonctionnement des m矇ca
-
Una Raccolta Di Applicazioni Di Blockchain Nella Rete Ad Hoc Veicolare
In questo libro, i servizi straordinari di blockchain sono presentati per fornire un servizio di ar
-
Eine Sammlung Von Anwendungen Der Blockchain Im Ad-Hoc-Vehikelnetz
In diesem Buch werden die au?ergew繹hnlichen Dienste von Blockchain vorgestellt, um einen dezentrale
-
Principles of Blockchain Systems
This book is the first to present the state of the art and provide technical focus on the latest ad
-
Principles of Blockchain Systems
This book is the first to present the state of the art and provide technical focus on the latest ad
-
The Protractor Handbook
Apress 出版Learn to quickly set up Protractor and dive into the amazing possibilities that this tool offers fo
-
The Ransomware Handbook
Ingram 出版The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks.
-
Routing multipercorso con algoritmi di flusso massimo per il traffico Internet
Questa ricerca presenta un nuovo protocollo multipath che calcola percorsi multipli in una rete se
-
Routing wielościeżkowy z wykorzystaniem algorytm籀w Max Flow dla ruchu internetowego
W pracy przedstawiono nowy protok籀l wielościeżkowy, kt籀ry oblicza wiele ścieżek
-
Routage ? trajets multiples utilisant des algorithmes de d矇bit maximal pour le trafic Internet
Cette recherche pr矇sente un nouveau protocole de trajets multiples qui calcule les trajets multiple
-
Roteamento Multi-Percurso Usando Algoritmos de Fluxo M獺ximo Para Tr獺fego na Internet
Esta investiga癟瓊o apresenta um novo protocolo multicaminhos que calcula m繳ltiplos caminhos numa red
-
Mehrweg-Routing mit Max-Flow-Algorithmen f羹r Internet-Verkehr
In dieser Forschungsarbeit wird ein neues Multipath-Protokoll vorgestellt, das mehrere Pfade in ein
-
Characterization of Cooperative Node Communications for Improved MANET
This work is motivated by the fact that a selfish replica allocation could lead to overall poor MAN
-
Healthcare Cybersecurity
Maintaining cybersecurity in today's technologically driven world is vital to the health of any bus
-
Python for Data Analysis
Ingram 出版DO YOUR CUSTOMERS WANT TO DISCOVER THE SECRETS BEHIND PYTHON DATA SCINCE?Do you want to make sure t
-
Principles of Computer Security: Comptia Security+ and Beyond Lab Manual (Exam Sy0-601)
Practice the Skills Essential for a Successful Career in Cybersecurity!This hands-on guide contains
-
The 60-Minute Podcast Startup
Ingram 出版How to start and monetize a podcast in one monthWould you like to turn your podcast idea into a via
-
Transfer Learning for Natural Language Processing
Ingram 出版Build custom NLP models in record time by adapting pre-trained machine learning models to solve spe
-
Crime Dot Com
Reaktion B 出版From Anonymous to the Dark Web, a dizzying account of hacking--past, present, and future. "Brillia
-
Industrial Applications of Neural Networks
CRC Press 出版Industrial Applications of Neural Networks explores the success of neural networks in different are