
Principles of Data Transfer Through Communications Networks, the Internet, and Autonomous Mobiles
Principles of Data Transfer Through Communications Networks, the Internet, and Autonomous Mobiles Author:by Izhak Rubin ...

Principles of Data Transfer Through Communications Networks, the Internet, and Autonomous Mobiles Author:by Izhak Rubin ...

A Volterra Approach to Digital Predistortion: Sparse Identification and Estimation Author:by Carlos Crespo-Cadenas (Auth...

Machine Intelligence Applications in Cyber-Risk Management Author:by Mohammed Amin Almaiah (Editor), Yassine Maleh (Edit...

Security and Privacy for 6G Massive IoT Author:by Georgios Mantas (Editor), Firooz Saghezchi (Editor), Jonathan Rodrigue...

Certified Ethical Hacker (CEH) Foundation Guide Author:by Sagar Ajay Rahalkar (Author) Publisher finelybook 出版社:Apress ...

Hybrid Communication Systems for Future 6G and Beyond: Visible Light Communication & Radio over Fiber Technology Author:...

Metasploit, 2nd Edition Author:David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O'Gorman (Autho...

Learn Penetration Testing with Python 3.x: An ethical hacker’s blueprint for offensive security - 2nd Edition Author:Yeh...

IoT Signal Detection Author:Rui Han (Author), Jingjing Wang (Author), Lin Bai (Author), Jianwei Liu (Author) Publisher f...

Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies) Author:Prabh Deep ...