Showing 271 to 281 of 281 (19 Pages)
Show:
Showing 271 to 281 of 281 (19 Pages)
Show:
Sort By:

Card List Article

This handbook provides a comprehensive technical guide covering fundamentals, recent advances and open issues in communications and networks. Communic..

Card List Article

A distributed sensor network (DSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, s..

Card List Article

This book discusses the principles of information security. Information security is the practice of defending information from unauthorized access, us..

Card List Article

This book discusses about the fundamental concept of computational intelligence and soft computing. Computational intelligence (CI) is a set of nature..

Card List Article

In this book, we discuss the computer simulation techniques in process improvement and management. A computer simulation is a simulation, run on a sin..

Card List Article

This book presents the study of the hardware and software that are the foundations of modern computer systems. Computer programming is a process that ..

Card List Article

In this book, we present the issues regarding cyber-crime and law. Computer crime refers to any crime that involves a computer and a network. The comp..

Card List Article

This book discusses the fundamentals that relates to cybercrime. It explores all aspects of computer-based crime and threats, offering solutions and b..

Card List Article

In this book, we discuss the basic concept of optical computing. Optical or photonic computing uses photons produced by lasers or diodes for computati..

Card List Article

This book presents a very broad view of quantum computing and information processing in general. A quantum computer is a computation system that makes..

Card List Article

This book discusses the essential concept of quantum cryptography. Quantum cryptography describes the use of quantum mechanical effects (in particular..

Brand Slider