Networking in 2023
Information Hiding and Machine Learning
by
Kumar, Raj, Yadav, Ashok Kumar
Cellular Vehicle-To-Everything (C-V2x)
by
Hu, Jinling, Zhao, Li, Chen, Shanzhi
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021
by
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices
by
Abich, Geancarlo, Ost, Luciano, Reis, Ricardo
Visual Data Insights Using SAS Ods Graphics: A Guide to Communication-Effective Data Visualization
by
Bessler, Leroy
Network Automation with Go: Learn how to automate network operations and build applications using the Go programming language
by
Kashin, Michael, Leiva, Nicolas
Signal Integrity: Applied Electromagnetics and Professional Practice
by
Russ, Samuel H.
Intelligent Computing and Communication for the Internet of Vehicles
by
Shen, Li, Mushu, Gao, Jie
Connecting the Internet of Things: Iot Connectivity Standards and Solutions
by
Chun, Anthony, Kumar, Anil, Hussain, Jafer
Cloud VR: Technology and Application
by
Li, Dawei, Huang, Kun, Xiong, Huaping
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence Using Sip: Scalable Distributed Applications and Media
by
Ranjan Roy, Radhika
Smart Grid in Iot-Enabled Spaces: The Road to Intelligence in Power
by
Al-Turjman, Fadi
Wireless Localization Techniques
by
Tong, Xinyu, Tian, Xiaohua, Wang, Xinbing
Microsoft Azure for Dummies
by
Hyman, Jack A.
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
by
Cambric, Shinesa, Ratemo, Michael
Wie kommt Ethik in die künstliche Intelligenz? Prinzipien, Merkmale und Leitlinien einer ethischen KI
by
Anonymous
Analysis of the BEM Code of Professional Guidelines
by
Hezam, Bandar
Security in Smart Home Networks
by
Zhu, Haojin, Shen, Meng, Yan
Optisystem Program for Various Fiber Optic Modeling
by
Muataz Abdulwahid, Maan, Kurnaz, Sefer, Abdu Ibrahim, Abdullahi
Industrial IoT for Architects and Engineers: Architecting secure, robust, and scalable industrial IoT solutions with AWS
by
Bernal, Joey, Sridhar, Bharath
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
by
Hardt, Robert, Pandit, Parth
High-Performance It Services
by
Critchley, Terry
Analyse de données scientifiques à l'aide de NEO4J
by
Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Compliance Made Easy
by
Cybersecurity Experts, Leading
Microsoft 365 Administration Inside Out
by
Kegg, Darryl, Fisher, Ed, Guilmette, Aaron
Trustworthy Autonomic Computing
by
Eze, Thaddeus
The Spatial Grasp Model: Applications and Investigations of Distributed Dynamic Worlds
by
Sapaty, Peter Simon
Visual Inference for Iot Systems: A Practical Approach
by
Velasco-Montero, Delia, Fernández-Berni, Jorge, Rodríguez-Vázquez, Angel
Access Control Models and Architectures for Iot and Cyber Physical Systems
by
Alshehri, Asma Hassan, Gupta, Maanak, Bhatt, Smriti
Auf welche Weise und unter welchen Bedingungen können Menschen und künstliche Intelligenz in der Produktion interaktiv zusammenarbeiten?
by
Rasch, Jean-Pierre
Implementing Cellular IoT Solutions for Digital Transformation: Successfully develop, deploy, and maintain LTE and 5G enterprise IoT systems
by
McCain, Dennis
Cloud-Computing
by
Upadhyay, Anurag, Kumar, Anshul
Cloud Computing
by
Kumar, Anshul, Upadhyay, Anurag
Practical Rust 1.x Cookbook: 100+ Solutions across Command Line, CI/CD, Kubernetes, Networking, Code Performance and Microservices
by
Team, Rustacean
Cloud Computing Playbook: 10 In 1 Practical Cloud Design With Azure, Aws And Terraform
by
Miller, Richie
Entwicklung eines neuartigen Modells für die Empfehlung vertrauenswürdiger Nutzer in OSN
by
Ishwariya, M., Issac, Franklin
Client Logbook: A client log book is a written record of a client's interactions with a particular service or organization.
by
Publishing, Myjwc
Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks
by
Fahmy, Hossam Mahmoud Ahmad
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Li, Zhenhua, Dai, Yafei, Chen, Guihai
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part I
by
Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems
by
Gaidamaka, Yuliya, Yarkina, Natalia, Naumov, Valeriy
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V
by
Eine Technik zur Standardisierung von Big Data für Datenmanagement-Anwendungen
by
Ishwariya, M., Issac, R. Franklin
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part VI
by
Cisco Cloud Infrastructure
by
Panzade, Komal, Shukla, Avinash, Patel, Jalpa
Interação Baseada em Recomendação
by
G. K., Suhas, Kumar Pareek, Piyush, Nandihal, Priya
A Proactive Network Surveillance Framework
by
Singh, Maninder
Interazione basata su raccomandazioni
by
Kumar Pareek, Piyush, Nandihal, Priya, G. K., Suhas
Managing the Buffer Overflow Attack in Network and Operating System Detecting and Preventing Techniques
by
Vadivelmurugan, P.
Künstliche Intelligenz: Das Wichtigste, was Du wissen musst
by
Simon, Walter
Closing the Loop: Systems Thinking for Designers
by
Cababa, Sheryl
Systems Engineering Neural Networks
by
Migliaccio, Alessandro, Iannone, Giovanni
Machine Learning Empowered Intelligent Data Center Networking: Evolution, Challenges and Opportunities
by
Wang, Ting, Li, Bo, Chen, Mingsong
Rust for Network Programming and Automation: Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust
by
Anderson, Brian
Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program
by
Brown, Jason
L'intelligenza artificiale nelle tecniche di data mining
by
Dhamodaran, S., Yovan Felix, A., Refonaa, J.
Data Center Networking: Network Topologies and Traffic Management in Large-Scale Data Centers
by
Guo, Deke
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide: Get your certification and prepare for real-world challenges as a
by
McLeroy, Eric
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
by
Tevault, Donald a.
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
by
Tevault, Donald a.
Distributed Systems: Theory and Applications
by
Ghosh, Ratan K., Ghosh, Hiranmay
Google Cloud Certified Associate Cloud Engineer Study Guide
by
Sullivan, Dan
Azure Containers Explained: Leverage Azure container technologies for effective application migration and deployment
by
Hooper, Richard, Haakman, Wesley
Computer Verstehen: Ein Streifzug Durch Das Innenleben Eines Computers
by
Nehmer, Jürgen
Understanding NFS: Network File System on Linux
by
Noble, Liza, Biswas, Sujata