 |
|
|
|
 |  |  Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the... |  |  Theoretical Introduction to ProgrammingIncluding easily digested information about fundamental techniques and concepts in software construction, this book is distinct in unifying pure theory with pragmatic details. Driven by generic problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to... |
|
|
|
 Stealing the Network: How to Own a ShadowThe best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress... |  |  |  |  NumPy Cookbook
We, NumPy users, live in exciting times. New NumPy-related developments seem to come
to our attention every week or maybe even daily. When this book was being written, NumPy
Foundation of Open Code for Usable Science was created. The Numba project—NumPy-aware,
dynamic Python compiler using LLVM—was announced. Also,... |
|
|
Result Page: 272 271 270 269 268 267 266 265 264 263 |