-
Emotions Online
Routledge 出版Digital media have become deeply immersed in our lives, heightening both hopes and fears of their a
-
Data Encryption Standard (DES) and Issues of DES and its Replacement
Ingram 出版Scientific Essay from the year 2022 in the subject Computer Science - IT-Security, grade: 75%, lang
-
Blockchain Technology and Application
Springer 出版This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 202
-
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Wiley 出版APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensi
-
Computer Performance Engineering
Springer 出版This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performanc
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 21st International Conference on Smart Card Research a
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Digital Forensics and Watermarking
Springer 出版This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
The Art of Sxo
Apress 出版Search Experience Optimization (SXO) is a fast growing field that combines the disciplines of Searc
-
Microsoft Cybersecurity Architect Exam Ref SC-100
Packt 出版Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day c
-
Information Systems Security
Springer 出版This book constitutes the refereed proceedings of the18th International Conference on Information S
-
-
Semantic Similarity from Natural Language and Ontology Analysis
Springer 出版Artificial Intelligence federates numerous scientific fields in the aim of developing machines able
-
Cyber Security
Ingram 出版Cyber security has never been more essential than it is today, it's not a case of if an attack will
-
Koncepts of Numbers in Quantitative Aptitude in CAT GMAT XAT CMAT MAT & Bank PO 3rd Edition
Ingram 出版The importance of Working with Numbers has increased tremendously in all Aptitude based tests in th
-
High Performance with Laravel Octane
Packt 出版Explore tools, techniques, and practices to remove performance bottlenecks and enhance the stabilit
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Network and
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! In this book you wil
-
Security, Privacy, and Applied Cryptography Engineering
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Security, Pr
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AN
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW A
-
Supercharging Node.js Applications with Sequelize
Packt 出版A hands-on implementation guide to application development in Node.js using the powerful Sequelize
-
Applied Intelligence and Informatics
Springer 出版This book constitutes the refereed proceedings of the Second International Conference on Applied In
-
Network Automation with Go
Packt 出版Understand the world of modern network automation with Go and deepen your knowledge with insights f
-
Cloud Identity Patterns and Strategies
Packt 出版Get to grips with identity patterns and design a structured enterprise identity model for cloud app
-
React Application Architecture for Production
Packt 出版A hands-on guide to help you develop skills and confidence in building and structuring React applic
-
Winning the National Security AI Competition
Apress 出版In introducing the National Security Commission on AI's final report, Eric Schmidt, former Google C
-
PCI Compliance
Ingram 出版The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is conti
-
Silicon Valley Cybersecurity Conference
Springer 出版This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cy
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Mathematical Modeling and Supercomputer Technologies
Springer 出版This book constitutes selected and revised papers from the 22nd International Conference on Mathema
-
The Richest Man in Babylon Blueprint for Financial Success
Bnpublishing 出版The Richest Man in Babylon: Blueprint for Financial Success - Lesson 1: The Man Who Desired Much Go
-
The Richest Man in Babylon
Bnpublishing 出版The Richest Man in Babylon: Now Revised and Updated for the 21st Century Now, in an updated, mode
-
Network Programming with Linux
Ingram 出版To construct today's distributed, network applications and services, you really want profound domin
-
The Magic Visual
Lulu.com 出版Making images will help you get noticed in any medium. The Magic Visual will teach you the how and
-
Secret Admirer
Ingram 出版This book will explain the origins and details of the 'parasocial relationship.'
-
Advancements in Interdisciplinary Research
Springer 出版This volume constitutes selected and revised papers presented at the First International Conference
-
High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on High-Perform
-
An Ethical Guide to Cyber Anonymity
Packt 出版Dive into privacy, security, and online anonymity to safeguard your identityKey Features: Leverage
-
Practical Highcharts with Angular
Apress 出版Learn to create stunning animated and interactive charts using Highcharts and Angular. This updated
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Animation at Work
Ingram 出版Animation isn't merely decorative-it's an invaluable tool for creating a better web. Start with sci
-
High-Performance Web Apps with Fastapi
Apress 出版Build APIs and web apps based on Asynchronous Server Gateway Interface (ASGI). This book provides a
-
Data Duped
Ingram 出版We are commonly deceived by numbers and data in our everyday lives. From lotteries, product warrant
-
Digital Forensics and Incident Response - Third Edition
Packt 出版Build your organization's cyber defense system by effectively applying digital forensics, incident