Memmo LogoMemmo - AI-verktyg och digital kurslitteratur
KurslitteraturKurser
Logga in / Skapa konto
Memmo Logo
Studieplattformen som hjälper studenter plugga smartare och få bättre betyg. Älskat av 25 000+ studenter.
© 2026 Bright Education AB
Stockholm, Sverige
Funktioner
  • Quiz
  • Flashcards
  • Sammanfattningar
  • AI-chatt
  • Podcast
  • Kurslitteratur
  • GPA-beräknare
  • Bokkategorier
Företag
  • FAQ
  • Artiklar
  • Om oss
  • Karriär
Annat
  • Mejla oss
  • Integritet
  • Villkor
AWS StartupsGoogle for StartupsMicrosoft for Startups
  • Hem
  • Alla kategorier
  • Cybersäkerhet, Moln & IoT

Kurslitteratur inom Cybersäkerhet, Moln & IoT

All kurslitteratur du behöver för studier inom Cybersäkerhet, Moln & IoT. Här hittar du ett brett utbud av e-böcker inom Cybersäkerhet, Moln & IoT hos oss. Hittar du inte vad du söker? Sök på ISBN, titel eller författare.

3 537 Böcker

Building Wireless Sensor Networks by Nandini Mukherjee, Sarbani Roy, Sarmistha Neogy

Building Wireless Sensor Networks

Nandini Mukherjee, Sarbani Roy, Sarmistha Neogy

636 kr

Enterprise Level Security 2 by Institute for Defense Analyses, Kevin E. Foltz, William R. Simpson

Enterprise Level Security 2

Institute for Defense Analyses, Kevin E. Foltz, William R. Simpson

513 kr

Machine Learning for Cloud Management by Anand Mohan, Ashutosh Kumar Singh, Jitendra Kumar, Rajkumar Buyya

Machine Learning for Cloud Management

Anand Mohan, Ashutosh Kumar Singh, Jitendra Kumar, Rajkumar Buyya

733 kr

Sensors, Cloud, and Fog by Subarna Chatterjee, Subhadeep Sarkar, Sudip Misra

Sensors, Cloud, and Fog

Subarna Chatterjee, Subhadeep Sarkar, Sudip Misra

904 kr

Phishing Detection Using Content-Based Image Classification by Rik Das, Shekhar Khandelwal

Phishing Detection Using Content-Based Image Classification

Rik Das, Shekhar Khandelwal

232 kr

Pervasive Communications Handbook by Hussein T. Mouftah, Mohammad Ilyas, Syed Ijlal Ali Shah

Pervasive Communications Handbook

Hussein T. Mouftah, Mohammad Ilyas, Syed Ijlal Ali Shah

990 kr

Configuring Internal Controls for Software as a Service by Chong Ee

Configuring Internal Controls for Software as a Service

Chong Ee

586 kr

Network and Application Security by Debashis Ganguly

Network and Application Security

Debashis Ganguly

1161 kr

Introduction to Security and Network Forensics by William J. Buchanan

Introduction to Security and Network Forensics

William J. Buchanan

733 kr

Cloud and Virtual Data Storage Networking by Greg Schulz

Cloud and Virtual Data Storage Networking

Greg Schulz

1344 kr

Information Security Evaluation by Igli Tashi, Solange Ghernaouti-Helie

Information Security Evaluation

Igli Tashi, Solange Ghernaouti-Helie

538 kr

Circuits and Systems for Security and Privacy by Farhana Sheikh, Leonel Sousa

Circuits and Systems for Security and Privacy

Farhana Sheikh, Leonel Sousa

942 kr

Practical Mathematical Cryptography by Kristian Gjøsteen

Practical Mathematical Cryptography

Kristian Gjøsteen

563 kr

Wireless Ad-hoc and Sensor Networks by Abdu Saif, Abhay Kumar Rai, Pawan Singh, Sachin Kumar Gupta, Sudesh Kumar

Wireless Ad-hoc and Sensor Networks

Abdu Saif, Abhay Kumar Rai, Pawan Singh, Sachin Kumar Gupta, Sudesh Kumar

647 kr

Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0 by Deepti Aggarwal, Mario José Diván, Shivani Bali, Vikram Bali, Vishal Bhatnagar

Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0

Deepti Aggarwal, Mario José Diván, Shivani Bali, Vikram Bali, Vishal Bhatnagar

563 kr

Ransomware and Cybercrime by Andrew Jenkinson

Ransomware and Cybercrime

Andrew Jenkinson

415 kr

IoT Sensors by Vinod Kumar Khanna

IoT Sensors

Vinod Kumar Khanna

647 kr

Mind the Tech Gap by Nikki Robinson

Mind the Tech Gap

Nikki Robinson

440 kr

Ransomware by Ravindra Das

Ransomware

Ravindra Das

367 kr

Cloud Security by Jamuna S. Murthy, Siddesh G. M., Srinivasa K. G.

Cloud Security

Jamuna S. Murthy, Siddesh G. M., Srinivasa K. G.

647 kr

Advanced Techniques and Applications of Cybersecurity and Forensics by Aryan Chaudhary, Keshav Kaushik, Mariya Ouaissa

Advanced Techniques and Applications of Cybersecurity and Forensics

Aryan Chaudhary, Keshav Kaushik, Mariya Ouaissa

647 kr

Computational Intelligence Applications in Cyber Security by Mohammad Faisal, Nawaf Alharbe, Raees Ahmad Khan, Rajeev Kumar, Suhel Ahmad Khan

Computational Intelligence Applications in Cyber Security

Mohammad Faisal, Nawaf Alharbe, Raees Ahmad Khan, Rajeev Kumar, Suhel Ahmad Khan

647 kr

Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities by Deepak Gupta, Diptendu Sinha Roy, K. Hemant Kumar Reddy, Mir Wajahat Hussain

Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities

Deepak Gupta, Diptendu Sinha Roy, K. Hemant Kumar Reddy, Mir Wajahat Hussain

647 kr

Embedded Devices and Internet of Things by Adesh Kumar, Gaurav Verma, Prashant Mani, Surajit Mondal

Embedded Devices and Internet of Things

Adesh Kumar, Gaurav Verma, Prashant Mani, Surajit Mondal

2017 kr

← FöregåendeSida 49 av 148Nästa →