The Tragedy of Liberation: A History of the Chinese Revolution ...
Frank Dikötter
Handbook of Proto-Tibeto-Burman: System and Philosophy of Sino-Tibetan ...
James Alan Matisoff
Dialectic of Enlightenment
Theodor W. Adorno & Max Horkheimer & Gunzelin Noeri
Symbol and Reality - Studies in the philosophy of Ernst Cassirer
Carl H. Hamburg
Handbook of Complex Analysis
Steven G. Krantz
Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-Native ...
Jason Morgan & Flynn
Cloud Computing: Concepts, Technology, Security, and Architecture
Thomas Erl & Eric Monroy
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Intelligent Internet of Things Networks
Haipeng Yao & Mohsen Guizani
Wireless Networks (1)
Computer Vision and Internet of Things
Lavanya Sharma & Mukesh Carpenter
Energy Efficient Computation Offloading in Mobile Edge Computing
Ying Chen & Ning Zhang & Yuan Wu & Sherman Shen
Intensional First-Order Logic: From AI to New SQL Big Data
Zoran Majkic
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
GreenEdge: New Perspectives to Energy Management and Supply ...
Guoming Tang & Deke Guo & Kui Wu
Edge Computing and IoT: Systems, Management and Security: Second ...
Kaishun Wu & Lu Wang & Yanjiao Chen
Hacking for Dummies
Kevin Beaver
Windows Server 2022 & PowerShell All-In-One for Dummies
Sara Perrott
Connectivity and Edge Computing in IoT: Customized Designs and ...
Jie Gao & Mushu Li & Weihua Zhuang
Mobile Edge Computing
Anwesha Mukherjee & Debashis de & Soumya K. Ghosh & Rajkumar Buyya
Foundation Db2 and Python: Access DB2 With Module Based API ...
W. David Ashley
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Internet of Things: Enabling Technologies, Security and Social ...
Santosh Kumar Pani & Manjusha Pandey
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven ...
Deepak Gupta & Aditya Khamparia
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu