
Bring Your Own Device Security Policy Compliance Framework (Information Systems Engineering and Management, 37)
Bring Your Own Device Security Policy Compliance Framework (Information Systems Engineering and Management, 37) by: Rath...

Bring Your Own Device Security Policy Compliance Framework (Information Systems Engineering and Management, 37) by: Rath...

Building Medallion Architectures: Designing with Delta Lake and Spark by: Piethein Strengholt (Author) Publisher: O̵...

Artificial Intelligence and Evaluation (Comparative Policy Evaluation) Author(s): Steffen Bohni Nielsen (Editor), France...

Smart Business and Technologies: Proceeding of the International Conference on Smart Business and Technologies (ICSBT’24...

Cloud Native Anti-Patterns: Avoiding Common Mistakes and Driving Success with Best Practices and Real-World Cases by: Ge...

Cybersecurity Education and Training by: Razvan Beuran (Author) Publisher: Springer Publication Date: 2025-04-03 Languag...

Bluesky For Dummies (For Dummies: Learning Made Easy) by: Eric Butow (Author), Rebecca Bollwitt (Author) Publisher: For ...

Social Robots in Education: How to Effectively Introduce Social Robots into Classrooms (Studies in Computational Intelli...

Network and Parallel Computing: 20th IFIP WG 10.3 International Conference, NPC 2024, Haikou, China, December 7–8, 2024,...

Advances in Computational Vision and Robotics: Proceedings of the International Conference on Computational Vision and R...