-
Secure Software Systems
Ingram 出版Secure Software Systems presents an approach to secure software systems design and development that
-
The Iot Architect’s Guide to Attainable Security and Privacy
Ingram 出版This book describes how to architect and design Internet of Things (loT) solutions that provide end
-
What Is ChatGPT Doing ... and Why Does It Work?
Ingram 出版Nobody expected this--not even its creators: ChatGPT has burst onto the scene as an AI capable of w
-
Ansible for Vmware by Examples
Apress 出版Learn to use the Ansible open source IT automation tool to automate your VMware infrastructure. Thi
-
Password Logbook (Hip Floral)
Ingram 出版Keep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a mo
-
The Social Media Guidebook and Calendar for Real Estate by OnJaLee LaShay
Lulu.com 出版Harness Social Media Power: Take control of your online presence and become an authoritative figure
-
Strategic Content Design
Ingram 出版Good content isn't magical--it's thoughtful, creative, and well researched words put together with
-
Constructive Side-Channel Analysis and Secure Design
Springer 出版This book constitutes the refereed proceedings of the 14th International Workshop on Constructive S
-
Code-Based Cryptography
Springer 出版This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography
-
Security and Trust Management
Springer 出版This book constitutes the post proceedings of the 18th International Workshop on Security and Trust
-
What Is Cybersecurity For?
How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key p
-
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Ingram 出版This book has recipes and tool development expertise and describe projects in malware analysis, web
-
Windows Ransomware Detection and Protection
Packt 出版Protect your end users and IT infrastructure against common ransomware attack vectors and efficient
-
Privacy in the Digital Age
Ingram 出版With the transition to the information age, a large amount of personal data has begun to be collect
-
CISSP Exam Study Guide For Security Professionals
Ingram 出版If you want to become a Cybersecurity Professional, this book is for you! BUY THIS BOOK NOW AND GE
-
-
Cybersecurity Enforcement and Monitoring Solutions
Ingram 出版If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on t
-
Tiktok Boom
Sourcebooks 出版A fascinating look behind the scenes of today's hottest social media app TikTok is the fastest grow
-
CISSP Exam Study Guide
Ingram 出版If you want to become a Cybersecurity Professional, this book is for you! If you are studying for
-
Cybersecurity Design Principles
Ingram 出版If you want to become a Cybersecurity Professional, this book is for you! If you are studying for
-
Cisco Cloud Infrastructure
Cisco Press 出版Manage, operate, and integrate existing infrastructure in hybrid and multicloud environments Hybr
-
-
Designing an Internet
Mit Press 出版Why the Internet was designed to be the way it is, and how it could be different, now and in the fu
-
Secure Searchable Encryption and Data Management
Ingram 出版This book provides every necessary detail required to develop the secure searchable encryption sche
-
Online Social Networks Security
Ingram 出版This book elaborates on various attacks on Social Networks with classifications, countermeasures an
-
Distributed Denial of Service (Ddos) Attacks
Ingram 出版This book is designed for readers who have an interest in the cyber security domain, including stud
-
Cybersecurity in the Covid-19 Pandemic
Ingram 出版This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemi
-
Campus Network Architectures and Technologies
Ingram 出版The book will provide readers with a comprehensive understanding of next-generation campus network
-
Russia’s Evolution Toward a Unified Strategic Operation
Ingram 出版In this report, RAND researchers examine the reasons behind Russia's evolution toward a unified str
-
Frontend Development Projects with Vue.js 3 - Second Edition
Packt 出版Let industry experts guide you on your journey to becoming a Vue.js developer with the help of prac
-
Aiot Technologies and Applications for Smart Environments
Ingram 出版Although some IoT systems are built for simple event control where a sensor signal triggers a corre
-
Zed Attack Proxy Cookbook
Packt 出版Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase o
-
Privacy in the Age of Big Data
Ingram 出版Thoroughly updates the first edition by addressing the significant advances in data-driven technolo
-
Windows APT Warfare
Packt 出版Learn Windows system design from the PE binary structure to modern and practical attack techniques
-
Optisystem Program for Various Fiber Optic Modeling
Ingram 出版In this book, several challenges face researchers and communication, engineering students. Especial
-
-
Privacy in Practice
Ingram 出版Privacy is not just the right to be left alone, but also the right to autonomy, control, and access
-
Views from the Bike Shed
Ingram 出版For Mark Charlton, blogging is 'a road of chance and discovery', one which has shaped the person he
-
The Shortcut
Ingram 出版An influential scientist in the field of artificial intelligence (AI) explains its fundamental conc
-
Privacy in Practice
Ingram 出版Privacy is not just the right to be left alone, but also the right to autonomy, control, and access
-
Decision and Game Theory for Security
Springer 出版This book constitutes the refereed proceedings of the 13th International Conference on Decision and
-
Learn React with TypeScript - Second Edition
Packt 出版Take your first step in building modern-day component-based web apps using the latest features and
-
Cybersecurity - Data Protection and Strategies
Ingram 出版The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics rel
-
Microsoft Defender for Endpoint in Depth
Packt 出版Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successfu
-
Cybersecurity - Data Protection and Strategies
Ingram 出版The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics rel
-
Medical Information Processing and Security
Ingram 出版Medical information refers to any data related to a patient's medical history, mental or physical c
-
Trustworthy Autonomic Computing
Ingram 出版The autonomic computing concept seeks to reduce the complexity of pervasively ubiquitous system man
-
Robust Portfolio Optimization and Estimation Techniques
Ingram 出版Praise for Robust Portfolio Optimization and Management "In the half century since Harry Markowitz