Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
The Identity of Man
Jacob Bronowski
The Uses of the Past From Heidegger to Rorty
Robert Piercey
Gnostic Religion in Antiquity
Roelof van den Broek
Segmented Worlds and Self: Group Life and Individual Consciousness
Yi-Fu Tuan
Machine Learning for Edge Computing: Frameworks, Patterns and ...
Amitoj Singh & Vinay Kukreja & Taghi Javdani Gandomani
Multi-Access Edge Computing: Software Development at the Network ...
Dario Sabella
Textbooks in Telecommunication Engineering (1)
5G IoT and Edge Computing for Smart Healthcare
Bhoi, Akash Kumar;de Albuquerque, Victor Hugo Costa;Sur, Samarendra ...
Bio-Inspired Optimization in Fog and Edge Computing Environments
Punit Gupta & Dinesh Kumar Saini & Pradeep Rawat & Kashif Zia
Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures ...
Muhammad Maaz Rehan & Mubashir Husain Rehmani
Edge Computing: Fundamentals, Advances and Applications
K. Anitha Kumari & G. Sudha Sadasivam & D. Dharani & M. Niranjanamurthy
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland