BOOKS - PROGRAMMING - The Blockchain Technology for Secure and Smart Applications acr...
The Blockchain Technology for Secure and Smart Applications across Industry Verticals (Advances in Computers, Volume 121) - Neeraj Kumar(Editor), Shubhani Aggarwal (Editor), Pethuru Raj (Editor) 2021 PDF Elsevier Inc BOOKS PROGRAMMING
ECO~19 kg CO²

2 TON

Views
86960

Telegram
 
The Blockchain Technology for Secure and Smart Applications across Industry Verticals (Advances in Computers, Volume 121)
Author: Neeraj Kumar(Editor), Shubhani Aggarwal (Editor), Pethuru Raj (Editor)
Year: 2021
Pages: 517
Format: PDF
File size: 54 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Distributed Intelligence Building an autonomous tech ecosystem with AI, blockchain, IoT and green energy
Blockchain and Applications, 4th International Congress (Lecture Notes in Networks and Systems, 595)
Retrieval Augmented Generation in Production with Haystack Building Trustworthy, Scalable, Reliable, and Secure AI Systems (Early Release)
Implementing GitOps with Kubernetes: Automate, manage, scale, and secure infrastructure and cloud-native applications on AWS and Azure
Retrieval Augmented Generation in Production with Haystack Building Trustworthy, Scalable, Reliable, and Secure AI Systems (Early Release)
Retrieval Augmented Generation in Production with Haystack Building Trustworthy, Scalable, Reliable, and Secure AI Systems (Early Release)
Mastering Solidity Contract Programming A Hands-On Guide to Ethereum Blockchain Development and Decentralized Applications
Mastering Solidity Contract Programming: A Hands-On Guide to Ethereum Blockchain Development and Decentralized Applications
Blockchain From Concept to Execution With 10 Blockchains, 3 DLTs, 182 MCQs, 70 Diagrams & Many Sample Codes
Mastering Solidity Contract Programming A Hands-On Guide to Ethereum Blockchain Development and Decentralized Applications
Industry 5.0 for Smart Healthcare Technologies Utilizing Artificial Intelligence, Internet of Medical Things and Blockchain
Hands-on Smart Contract Development with Hyperledger Fabric V2 Building Enterprise Blockchain Applications (Final)
Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing Theoretical Basics, Applications, and Challenges
Environmental Science and Technology: Sustainable Development: International Conference on Environmental Science and Technology (Environmental Science and Engineering)
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
Supporting Higher Education 4.0 with Blockchain: Critical Analyses of Automation, Data, Digital Currency, and Other Disruptive Applications
Technology for the United States Navy and Marine Corps, 2000-2035 Becoming a 21st-Century Force: Volume 8: Logistics (Technology for the United States … Becoming a 21St-Century Force , Vol 8)
Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain (Emerging Trends in Biomedical Technologies and Health informatics)
Tomorrow’s Jobs Today Wisdom And Career Advice From Thought Leaders In Ai, Big Data, Blockchain, The Internet Of Things, Privacy, And More
Industry 5.0 for Smart Healthcare Technologies: Utilizing Artificial Intelligence, Internet of Medical Things and Blockchain (Edge AI in Future Computing)
DevOps Design Pattern Implementing DevOps best practices for secure and reliable CI/CD pipeline
DevOps Design Pattern Implementing DevOps best practices for secure and reliable CI/CD pipeline
Disorganized Attachment No More!: The Complete Blueprint to Achieving a Secure Attachment Style in Relationships
Mastering Secure Java Applications Navigating security in cloud and microservices for Java
Secure Coordination Control of Networked Robotic Systems From a Control Theory Perspective
Secure Coordination Control of Networked Robotic Systems From a Control Theory Perspective
Your Retirement Income Blueprint: A Six-Step Plan to Design and Build a Secure Retirement
Network Programming with Go Learn to Code Secure and Reliable Network Services from Scratch
Mastering Secure Java Applications Navigating security in cloud and microservices for Java
Step by Step Fault Tolerant, Scalable, and Secure AWS Stack
Finance Your Business: Secure Funding to Start, Run, and Grow Your Business
Wireless Security Architecture Designing and Maintaining Secure Wireless for Enterprise
Zero Trust Networks Building Secure Systems in Untrusted Networks, 2nd Edition (Final)
Integrating Rust Adopt Rust effortlessly for secure, scalable, and high-performance systems
Building Secure PHP Applications A Comprehensive Guide to Protecting Your Web Applications from Threats
Zero Trust Networks Building Secure Systems in Untrusted Networks, 2nd Edition (Final)
Building Secure PHP Applications A Comprehensive Guide to Protecting Your Web Applications from Threats
DevOps Design Pattern: Implementing DevOps best practices for secure and reliable CI CD pipeline (English Edition)
Generative AI for Cloud Solutions: Architect modern AI LLMs in secure, scalable, and ethical cloud environments
Split Federated Learning for Secure IoT Applications Concepts, frameworks, applications and case studies