BOOKS - PROGRAMMING - The Blockchain Technology for Secure and Smart Applications acr...
The Blockchain Technology for Secure and Smart Applications across Industry Verticals (Advances in Computers, Volume 121) - Neeraj Kumar(Editor), Shubhani Aggarwal (Editor), Pethuru Raj (Editor) 2021 PDF Elsevier Inc BOOKS PROGRAMMING
ECO~19 kg CO²

2 TON

Views
86957

Telegram
 
The Blockchain Technology for Secure and Smart Applications across Industry Verticals (Advances in Computers, Volume 121)
Author: Neeraj Kumar(Editor), Shubhani Aggarwal (Editor), Pethuru Raj (Editor)
Year: 2021
Pages: 517
Format: PDF
File size: 54 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Implementing Multifactor Authentication: Secure your applications from cyberattacks with the help of MFA solutions
The Pandemic Paradox: How the COVID Crisis Made Americans More Financially Secure
Sexiest Heroes Collection: A Ring to Secure His Heir Midnight Special All or Nothing
Intelligent Secure Trustable Things (Studies in Computational Intelligence, 1147)
Wireshark 2 Quick Start Guide Secure your network through protocol analysis
Stop Worrying about Money: Start Planning Now to Secure Your Financial Future
Cisco ISE for BYOD and Secure Unified Access, 2nd Edition
The Art of WebAssembly: Build Secure, Portable, High-Performance Applications
How To Host, Secure, and Deliver Static Websites on Amazon Web Services
Essential Cybersecurity Science Build, Test, and Evaluate Secure Systems
Control Your Home with Raspberry Pi Secure, Modular, Open-Source and Self-Sufficient
A Secure Base: Parent-Child Attachment and Healthy Human Development
Hacked The Inside Story of America|s Struggle to Secure Cyberspace
Multimaterial 3D Printing Technology (3D Printing Technology Series)
Big Data Analytics and Intelligent Applications for Smart and Secure Healthcare Services
The SSIS Catalog: Install, Manage, Secure, and Monitor your Enterprise ETL Infrastructure
Attached: Are you Anxious, Avoidant or Secure? How the science of adult attachment can help you find - and keep - love
Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities
Cyber Security and Business Analysis An essential guide to secure and robust systems
Building Secure and Reliable Systems SRE and Security Best Practices (Early Release)
Cyber Security and Business Analysis An essential guide to secure and robust systems
The Peacekeeping Economy: Using Economic Relationships to Build a More Peaceful, Prosperous, and Secure World
Cyber Security and Business Analysis: An essential guide to secure and robust systems
Practical Cloud Security A Guide for Secure Design and Deployment (Early Release)
Fixtures and Chucks for Woodturning, Revised and Expanded Edition Everything You Need to Know to Secure Wood on Your Lathe
The New Rules of Attachment: How to Heal Your Relationships, Reparent Your Inner Child, and Secure Your Life Vision
The Four-Minute Retirement Plan: Preserve Your Past, Secure Your Future, Live for Today
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH)
Cisco Security Professional|s Guide to Secure Intrusion Detection Systems
Engineering Secure Devices A Practical Guide for Embedded System Architects and Developers
The End Is Near and It|s Going to Be Awesome: How Going Broke Will Leave America Richer, Happier, and More Secure
Threat Modeling Risk Identification and Avoidance in Secure Design (Early Release)
Practical Cloud Security A Guide for Secure Design and Deployment 1st Edition
Istio Up and Running Using a Service Mesh to Connect, Secure, Control, and Observe (First Edition)
On-Chip Current Sensors for Reliable, Secure, and Low-Power Integrated Circuits
Engineering Secure Devices A Practical Guide for Embedded System Architects and Developers
Machine Learning, Blockchain, and Cyber Security in Smart Environments
Blockchain-Based Digital Twins Research Trends and Challenges
Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence