Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks Prasannavenkatesan Theerthagiri Chapter 2: IoE Based Genetic Algorithms and its Requisition Neeraj Kumar Rathore, Shubhangi Pande Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le Chapter 4: Managing IoT -Cloud based Security: Needs and Importance Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal Chapter 5: Predictive Maintenance in Industry 4.0 Manoj Devare Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment Mahboob Alam, Mohd Amjad and Mohd. Naseem Chapter 8: The UAV Assisted Wireless Ad Hoc Network Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism Mohit Kumar, Ram Shringar Raw, Bharti Nagpal Chapter 11: Cryptography Techniques for Information Security: A Review Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello Chapter 13: A Cyber security Perspective of Machine Learning Algorithms Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks Prasannavenkatesan Theerthagiri Chapter 2: IoE Based Genetic Algorithms and its Requisition Neeraj Kumar Rathore, Shubhangi Pande Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le Chapter 4: Managing IoT -Cloud based Security: Needs and Importance Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal Chapter 5: Predictive Maintenance in Industry 4.0 Manoj Devare Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment Mahboob Alam, Mohd Amjad and Mohd. Naseem Chapter 8: The UAV Assisted Wireless Ad Hoc Network Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism Mohit Kumar, Ram Shringar Raw, Bharti Nagpal Chapter 11: Cryptography Techniques for Information Security: A Review Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello Chapter 13: A Cyber security Perspective of Machine Learning Algorithms Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497