Computational Intelligent Security in Wireless Communications (eBook, ePUB)
Redaktion: Khan, Suhel Ahmed; Faisal, Mohammad; Khan, Raees Ahmad; Kaiwartya, Omprakash; Kumar, Rajeev
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Computational Intelligent Security in Wireless Communications (eBook, ePUB)
Redaktion: Khan, Suhel Ahmed; Faisal, Mohammad; Khan, Raees Ahmad; Kaiwartya, Omprakash; Kumar, Rajeev
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.27MB
Andere Kunden interessierten sich auch für
- Computational Intelligent Security in Wireless Communications (eBook, PDF)52,95 €
- 5G Wireless Communication System in Healthcare Informatics (eBook, ePUB)52,95 €
- Kannan GovindanMultihop Mobile Wireless Networks (eBook, ePUB)131,95 €
- Ramjee PrasadAdaptive PHY-MAC Design for Broadband Wireless Systems (eBook, ePUB)131,95 €
- Yifei YuanMetasurfaces for Wireless Communications (eBook, ePUB)120,95 €
- Héctor J. De Los SantosUnderstanding Communications Systems Principles-A Tutorial Approach (eBook, ePUB)125,95 €
- John F. M. GerritsWideband FM Techniques for Low-Power Wireless Communications (eBook, ePUB)75,95 €
-
-
-
This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 296
- Erscheinungstermin: 21. März 2023
- Englisch
- ISBN-13: 9781000689020
- Artikelnr.: 65264568
- Verlag: Taylor & Francis
- Seitenzahl: 296
- Erscheinungstermin: 21. März 2023
- Englisch
- ISBN-13: 9781000689020
- Artikelnr.: 65264568
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Suhel Ahmed Khan, Raees Ahmad Khan
Chapter 1: An investigation on Cooperative Communication Techniques in
Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri
Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande
Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le
Chapter 4: Managing IoT -Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh
Pal, Bineet Kumar Gupta, Alka Agrawal
Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare
Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key
Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma
Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using
Parallel and Distributed Analytics Approaches on Big Data in cloud
environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem
Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan
Chapter 9: Integrating Cybernetics into Healthcare System: Security
Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma,
Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak
Chapter 10: Threats and Countermeasures in Digital Crime and Cyber
Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal
Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav
Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello
Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak,
Majid Zaman, Alka Agrawal
Chapter 14: Statistical Trend in Cyber Attacks and Security Measures
Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri
Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande
Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le
Chapter 4: Managing IoT -Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh
Pal, Bineet Kumar Gupta, Alka Agrawal
Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare
Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key
Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma
Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using
Parallel and Distributed Analytics Approaches on Big Data in cloud
environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem
Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan
Chapter 9: Integrating Cybernetics into Healthcare System: Security
Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma,
Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak
Chapter 10: Threats and Countermeasures in Digital Crime and Cyber
Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal
Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav
Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello
Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak,
Majid Zaman, Alka Agrawal
Chapter 14: Statistical Trend in Cyber Attacks and Security Measures
Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Chapter 1: An investigation on Cooperative Communication Techniques in
Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri
Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande
Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le
Chapter 4: Managing IoT -Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh
Pal, Bineet Kumar Gupta, Alka Agrawal
Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare
Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key
Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma
Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using
Parallel and Distributed Analytics Approaches on Big Data in cloud
environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem
Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan
Chapter 9: Integrating Cybernetics into Healthcare System: Security
Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma,
Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak
Chapter 10: Threats and Countermeasures in Digital Crime and Cyber
Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal
Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav
Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello
Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak,
Majid Zaman, Alka Agrawal
Chapter 14: Statistical Trend in Cyber Attacks and Security Measures
Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri
Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande
Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le
Chapter 4: Managing IoT -Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh
Pal, Bineet Kumar Gupta, Alka Agrawal
Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare
Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key
Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma
Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using
Parallel and Distributed Analytics Approaches on Big Data in cloud
environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem
Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan
Chapter 9: Integrating Cybernetics into Healthcare System: Security
Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma,
Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak
Chapter 10: Threats and Countermeasures in Digital Crime and Cyber
Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal
Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav
Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello
Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak,
Majid Zaman, Alka Agrawal
Chapter 14: Statistical Trend in Cyber Attacks and Security Measures
Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla