Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
Bemærk: Kan ikke leveres før jul.
What debates have caused spectrum policy to change course, and which will determine its future direction? This book examines these issues through a series of essays from a range of notable experts.
Bemærk: Kan ikke leveres før jul.
Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the dynamic interplay between fractals and graph theory, two powerful mathematical tools with vast applications. It presents a strategic combination and the synergistic use of these disciplines to address real-world problems and challenges.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple carriers and enterprises.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book is an essential guide to IPv6 network slicing. It covers both the fundamentals and cutting-edge technologies of IPv6 network slicing, and provides insights into future industry developments.
Bemærk: Kan ikke leveres før jul.
The book collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. Beginning with the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers the green machine learning protocols for cellular communication, federated learning-based models and protocols for... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan leveres før jul.
This practical book provides a detailed explanation of the zero trust security model. The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.