for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book covers all the aspects of Blockchain and its application in IOT and focuses on Blockchain, its features, and the core technologies that are used... Læs mere
Bemærk: Kan ikke leveres før jul.
This book proposes to provide a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain with a... Læs mere
Bemærk: Kan ikke leveres før jul.
The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives,... Læs mere
Bemærk: Kan ikke leveres før jul.
The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives,... Læs mere
Bemærk: Kan ikke leveres før jul.
The reference text covers emerging wireless communication technologies, such as massive MIMO, mmWave, and visible... Læs mere
Bemærk: Kan ikke leveres før jul.
The fourth industrial revolution, Industry 4.0, is changing the world around us. Education is not immune to these changes. This contributed book presents advanced technologies and applications for Education 4.0.
Bemærk: Kan ikke leveres før jul.
The book addresses the issues faced by teachers in the adoption of digital tools into their teaching. It presents theoretical perspectives of... Læs mere
Bemærk: Kan ikke leveres før jul.
IT and cybersecurity teams have had a long-standing battle between functionality and security. To understand where the problem... Læs mere
Bemærk: Kan ikke leveres før jul.
IT and cybersecurity teams have had a long-standing battle between functionality and security. To understand where the problem... Læs mere
Bemærk: Kan ikke leveres før jul.
user level
Bemærk: Kan ikke leveres før jul.
Provides an overview of the IoT and its architectures and its uses in our daily life and other domains, and... Læs mere
Bemærk: Kan ikke leveres før jul.
A guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, this... Læs mere