Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The book reports two approaches of implementation of the essential components of a Digital Phase Locked Loop based system for dealing with wireless channels showing Nakagami-m fading.
Bemærk: Kan ikke leveres før jul.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016.
Bemærk: Kan ikke leveres før jul.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016.
Bemærk: Kan ikke leveres før jul.
The broad scope of Cloud Computing is creating a technology, business, sociolo- cal, and economic renaissance. Cloud users experience Cloud services as virtual, off-premise applications provided by Cloud service providers.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet’15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents an in-depth treatment of routing and wavelength assignment for optical networks, and focuses specifically on quality-of-service and fault resiliency issues.
Bemærk: Kan ikke leveres før jul.
This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.