Showing 1 to 10 of 403 entries
$3480

Behavioral biometrics helps in uniquely identifying an individual based on measurable patterns of human traits such as keystroke analysis, voice authentication, and signature verif...

$3480

A battle management system provides the military unit with an integrated common operating picture (COP), which utilizes collaborative planning tools to enhance the decision-making ...

$3480

A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks ...

$3480

Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from major cyber threats, such as cyber terrorism, cy...

$3480

Industrial Cybersecurity is designed to protect industrial environments from cyber threats at all stages. Industrial cybersecurity is a highly growing and dynamic area of concern. ...

$3480

Industrial communication protocols such as Ethernet are widely used in office networks for data transfers. In the recent times, communication protocols are used in factory floors t...

$3480

Identity and access management (IAM) is a framework for business processes that facilitates the management of electronic or digital identities. The framework includes the organizat...

$3480

A data center is a centralized facility used for data computing, processing, and storage. A data center consists of networking equipment; high-performance servers; storage arrays; ...

$3480

Hyper-converged infrastructure (HCI) is a software-defined IT infrastructure that virtualizes all of the elements of conventional "hardware-defined" systems. HCI includes...

$3480

Hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By ...