245 rezultatov
-
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots(2022) HUANG ET ALVezava: Mehka135,80 €
-
BTEC Nationals Information Technology Student Book + Activebook(2016) PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID58,59 €
-
Marx and the Robots - Networked Production, AI and Human Labour(2022) FLORIAN BUTOLLOVezava: Mehka35,63 €
-
Exploring Malicious Hacker Communities(2021) MARIN, ERICSSON (CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA),ALMUKAYNIZI, MOHAMMED (KING SAUD UNIVERSITY, SAUDI ARABIA),SARKAR, SOUMAJYOTI (ARIZONA STATE UNIVERSITY),NUNES, ERIC (ARIZONA STATE UNIVERSITY),SHAKARIAN, JANA,SHAKARIAN, PAULOAs cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from malVezava: Trda98,00 €
-
-
Security Issues for Wireless Sensor Networks(2022) VERMA, PARAG,DUMKA, ANKUR,BHARDWAJ, ANUJ,KAUR, NAVNEET,ASHOK, ALAKNANDA (PANTNAGAR, COLLEGE OF TECHNOLOGY, G.B. PANT UNIVERSITY OF AGRICULTURE AND TECHNOLOGY, RUDRAPUI, UTTARAKHAND, INDIA),BISHT, ANIL KUMAR,GANGWAR, RAKSH PAL SINGHThis book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor networkVezava: Trda77,51 €
-
Information Security Policies, Procedures, and Standards(2020) LANDOLL, DOUGLAS J.This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. HighlightingVezava: Mehka62,71 €
-
Design Structure Matrix Methods and Applications(2016) EPPINGER, STEVEN D. (PROFESSOR OF MANAGEMENT SCIENCE AND INNOVATION, MASSACHUSETTS INSTITUTE OF TECHNOLOGY),BROWNING, TYSON R. (ASSOCIATE PROFESSOR OF OPERATIONS MANAGEMENT, NEELEY SCHOOL OF BUSINESS)Vezava: Mehka77,35 €
-
Dimensions of Uncertainty in Communication Engineering(2022) BIGLIERI, EZIO (UNIVERSITAT POMPEU FABRA, BARCELONA, SPAIN.)Vezava: Mehka145,85 €
-
Computational Approaches to the Network Science of Teams(2020) LI, LIANGYUE,TONG, HANGHANG (UNIVERSITY OF ILLINOIS, URBANA-CHAMPAIGN)This comprehensive review for researchers and practitioners in data mining and social networks surveys recent progress in team science. Focusing on underlying network structures, it presents models and algorithms for characterizing, predicting, optimizingVezava: Trda80,50 €
-
Google Hacking for Penetration Testers(2015) GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)Vezava: Mehka77,10 €
-
Measuring and Managing Information Risk(2014) FREUND, JACK (VP, HEAD OF CYBER RISK METHODOLOGY FOR BITSIGHT, US),JONES, JACK (CO-FOUNDER AND PRESIDENT OF CXOWARE, INC., US)Vezava: Mehka71,27 €
-
Core Data Analysis: Summarization, Correlation, and Visualization(2019) MIRKIN, BORISVezava: Mehka86,61 €
-
-
Building Event-Driven Microservices(2020) BELLEMARE, ADAMWith this practical guide, you’ll learn how to leverage large-scale data usage across the business units in your organization using the principles of event-driven microservices.Vezava: Mehka68,39 €