BOOKS - NETWORK TECHNOLOGIES - Advancing Smarter and More Secure Industrial Applicati...
Advancing Smarter and More Secure Industrial Applications Using Ai, Iot, and Blockchain Technology - Saini Kavita 2022 EPUB IGI Global BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
80638

Telegram
 
Advancing Smarter and More Secure Industrial Applications Using Ai, Iot, and Blockchain Technology
Author: Saini Kavita
Year: 2022
Pages: 336
Format: EPUB
File size: 45,1 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Foundations of secure computation
The Perfect Witness (Secure One #2)
Engineering Secure Devices
Building a Smarter University: Big Data, Innovation, and Analytics (SUNY series, Critical Issues in Higher Education)
Big Money Thinks Small: Biases, Blind Spots, and Smarter Investing (Columbia Business School Publishing)
Intelligent Secure Trustable Things
Saving Jessie (Safe and Secure #2)
Брандмауэры Cisco Secure Pix
Secure Target (Elite Operators, #1)
Saving Mallory: (Safe and Secure #4)
Saving Callie (Safe and Secure #5)
Saving Becky (Safe and Secure #6)
The Red River Slayer (Secure One, 3)
Intelligent Secure Trustable Things
Secure Localization and Time Synchronization
Saving Sharlee (Safe and Secure #1)
Strong Borders, Secure Nation
The Book on Tax Strategies for the Savvy Real Estate Investor: Powerful Techniques Anyone Can Use to Deduct More, Invest Smarter, and Pay Far Less to the Irs!
We Keep Us Safe: Building Secure, Just, and Inclusive Communities
Node.js Secure Coding: Defending Against Command
Designing Secure Software: A Guide for Developers
Developing Secure Applications with Visual Basic
Certified Secure Computer User Version 2
Designing Secure Software A Guide for Developers
Secure and Smart Cyber-Physical Systems
Tom: To Secure His Legacy (Other Pens Book 4)
Modeling and Design of Secure Internet of Things
Secure and Smart Cyber-Physical Systems
Secure Coordination Control of Networked Robotic
Secure and Smart Cyber-Physical Systems
Engineering Secure Internet of Things Systems
SHARKS in the MOAT How to Create Truly Secure Software
Secure Relating: Holding Your Own in an Insecure World
Advancing and Consolidating Mathematical Modelling: Research from ICME-14 (International Perspectives on the Teaching and Learning of Mathematical Modelling)
Architectures and Protocols for Secure Information Technology Infrastructures
Blockchain Technology for Secure Social Media Computing
Protocols for Secure Electronic Commerce, 3rd Edition
The Memo: What Women of Color Need to Know to Secure a Seat at the Table
Fighting Terror after Napoleon How Europe Became Secure after 1815
Mobile Security How to Secure, Privatize, and Recover Your Devices