Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
In this book, we will provide an overview of the fundamental concepts of Edge Computing, Edge intelligence using advanced machine and deep learning... Læs mere
Bemærk: Kan ikke leveres før jul.
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach... Læs mere
Bemærk: Kan ikke leveres før jul.
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach... Læs mere
Bemærk: Kan ikke leveres før jul.
Offers a new approach to storytelling by weaving coding into stories. Playfully, it encourages the readers to see computing as easier to understand and present in... Læs mere
Bemærk: Kan ikke leveres før jul.
This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language
Bemærk: Kan ikke leveres før jul.
The book is a one-stop source for cryptographic methods used in payment technologies in major global markets: legacy magnetic stripe (e.g., EMV, 3DS 2.0, DUKPT).... Læs mere
Bemærk: Kan ikke leveres før jul.
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications.
Bemærk: Kan ikke leveres før jul.
In addition to acting as a core title for classes in digital communications, the book also can be included in classes in digital networks, information theory and coding, or digital modulation theory.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools needed to secure cloud platforms.
Bemærk: Kan ikke leveres før jul.
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools needed to secure cloud platforms.
Bemærk: Kan ikke leveres før jul.
The contents focus on the properties of groups, subgroups, cyclic groups, permutation groups, cosets and Lagrange’s theorem, normal subgroups and factor groups, group homomorphisms and isomorphisms, automorphisms, direct products, group actions and Sylow theorems.