1
2
3
4
5
6
7
8
9
10
11
by Lysne, Olav.
Published 2018
Format:
Table of Contents: ... Are We Afraid Of? -- 1.3 Huawei and ZTE -- 1.4 Trust in Vendors -- 1.5 Points of Attack -- 1.6 Trust...
Click to View
12
13
by Cheruvu, Sunil.
Published 2019
Format:
Table of Contents: ... -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity...
Click to View
14
by Ravichandran, Aruna.
Published 2016
Format:
Table of Contents: ... Development -- Agile Empowerment Challenges -- Modern Application Architectures -- Microservices: Small Isn...
Click to View
15
by El Ebrashi, Raghda.
Published 2023
Format:
Table of Contents: ... Performance -- NIS in Developing Countries -- Construction of the Algerian NIS, Capacities, and Economic...
Click to View
16
by Sumarmi, Sumarmi.
Published 2023
Format:
Table of Contents: ... of Pancasila Village Program -- 3.2 The Impact of Pancasila Village -- 3.3 Implementation of Pancasila Village...
Click to View
17
by Wijaya, Andy Fefta.
Published 2023
Format:
Table of Contents: ... Development Programs in Gadingkulon Village, Dau Sub-district -- 4.1 Emphasizing the Collaborative Process...
Click to View
18
by Galis, Alex.
Published 2013
Format:
Table of Contents: ... and Autonomic Management -- Towards a Socially-Aware Management of New Overlay Application Traffic Combined...
Click to View
19
by Procházka, Jakub.
Published 2019
Format:
Table of Contents: ..., associations with related constructs and applications in work psychology -- Engagement in actions beyond basic...
Click to View
20
by Domingue, John.
Published 2011
Format:
Table of Contents: ...: Future Internet Foundations: Security and Trust -- Introduction to Part III -- Security Design...
Click to View