-
-
-
-
-
-
-
-
-
Advanced Computing
Springer 出版The two-volume set CCIS 2053 and 2054 constitutes the refereed post-conference proceedings of the 1
-
-
Soft Computing Applications in Modern Power and Energy Systems
Springer 出版This book includes select proceedings of EPREC 2023. It provides rigorous discussions, case studies
-
Implementation of Geographic UAV and Security
The purpose of the project is to implement a Geographic UAV and security attacks in mobile ad-hoc n
-
-
-
The Girl Math Bible
Unleash your financial prowess with "The Girl Math Bible" by Penny Wise! Navigate the world of savi
-
Emerging Automation Techniques for the Future Internet
Ingram 出版Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectiv
-
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism
Ingram 出版Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional
-
Modern Perspectives on Virtual Communications and Social Networking
Ingram 出版With the prevalence of social media, businesses and other organizations have a growing need to util
-
-
Leveraging IoT, SDN, and AI Innovations for Smart Systems
Ingram 出版This book authored by Mykola Beshley, Mykhailo Klymash, Halyna Beshley, Natalia Kryvinska and Orest
-
Scope Complexity Management Planning, Public Software Projects
This book, Scope Complexity Management in Planning Public Software Projects, contains a rich Abstra
-
Analysis of PCF and SMF Junctions Used in Optical Networks
Ingram 出版Due to the growing human need for networks with high bandwidth and high reliability, optical fibers
-
-
-
-
-
-
-
-
-
Advanced Python Scripting for ArcGIS Pro
Esri Press 出版Tackle complex spatial data tasks effortlessly with this easy-to-follow guide to writing specialize
-
-
-
-
-
Reddit? Diddit!
Reddit? Diddit! A satirical guide to navigating the wild world of Reddit, where everyone's an exper
-
-
-
-
Identifying and Mitigating the Security Risks of Generative AI
Every major technical invention resurfaces the dual-use dilemma - the new technology has the potent
-
-
-
-
-
Cryptocoding Based on Quasigroups
This book presents the concept of cryptcoding which arises from the need to obtain secure and accur
-
Traffic optimization in multiservice networks
The continuous increase of traffic in converged networks has generated the need to improve bandwidt
-
-
Designing a prototype with a Secure Network Architecture
This text is aimed at students and professionals who are interested in the branch of security of ne