In a global market economy, a viable business cannot be locked into a single form or function anymore. Rather, success is contingent upon a self-renewing capacity to spontaneously create structures,……続きを見る
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and com……続きを見る
Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. The……続きを見る
This book surveys the various methods and problems of organizing nonprint materials and describes the use of microcomputers both for storing nonprint items and keeping track of them. It is useful fo……続きを見る
著者:Mohammed Ali
出版社: Springer International Publishing
発売日: 2023年09月18日
This textbook will delve into the philosophical foundation of contemporary IS research design with particular emphasis on the methodological tools that can be applied to conduct effective research i……続きを見る
This guide is intended for students learning computer operations and administration on the AS/400 computer system. Offering a unique approach to learning AS/400 operations with extensive hands-on la……続きを見る
The book explains core concepts while providing real world implementation specifics, detailing the administration-related activities with Oracle SOA Suite 11g with a step-by-step approach using real……続きを見る
Personal technology continues to evolve every day, but business technology does not follow that trend. Business IT is often treated as a necessary evil that cant be relied upon to take companies to ……続きを見る
La ciencia es la forma de racionalidad determinante debido a sus consecuencias a gran escala. Vivimos actualmente varias revoluciones en la ciencia y este libro se ocupa de una de ellas: la teoría d……続きを見る
Deep Learning Approaches for Security Threats in IoT Environments
An expert discussion of the application of deep learning methods in the IoT security environment
In Deep Learning Approaches for Sec……続きを見る