for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book is written for the project manager as well as the many other stakeholders involved in business projects. It gives basic techniques that can be adapted... Læs mere
Bemærk: Kan ikke leveres før jul.
This book focuses on both the design and implementation of AI-based approaches for systems that aid in monitoring and combating... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is written for the project manager as well as the many other stakeholders involved in business projects. It gives basic techniques that can be adapted... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces readers to tools in the R programming language for accessing and analyzing Census data, helping analysts manage these types of projects in a single computing environment.
Bemærk: Kan ikke leveres før jul.
This book provides detailed descriptions of downlink non-orthogonal multiple transmissions and uplink non-orthogonal multiple access (NOMA) from the aspects of majorly used 5G New Radio scenarios and system performance.
Bemærk: Kan ikke leveres før jul.
This book introduces readers to tools in the R programming language for accessing and analyzing Census data, helping analysts manage these types of projects in a single computing environment.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book, the first in a series of three, provides a look at the foundations of artificial intelligence and analytics and why readers need an unbiased understanding of the subject.
Bemærk: Kan ikke leveres før jul.
Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the... Læs mere
Bemærk: Kan ikke leveres før jul.
Cyber attacks are rapidly increasing in sophistication and magnitude. The last few years having seen a ransomware boom and distributed denial-of-service attacks... Læs mere
Bemærk: Kan ikke leveres før jul.
The book demonstrates digital forensics and cyber investigation techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record (MBR) and Guide Partition Table (GBT) as part of the investigative process.