-
Modern Frontend Development with Node.js
Packt 出版Enhance your web development projects by fully leveraging Node.js concepts, tools, and best practic
-
An Event-Driven Parallel-Processing Subsystem for Energy-Efficient Mobile Medical Instrumentation
Ingram 出版Aging population and the thereby ever-rising cost of health services call for novel and innovative
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Machine Learning and Principles and Practice of Knowledge Discovery in Databases
Springer 出版This volume constitutes the papers of several workshops which were held in conjunction with the Int
-
Cryptography, Codes and Cyber Security
Springer 出版This book constitutes the refereed First International Conference on Cryptography, Codes and Cyber
-
Iso/Iec 27001:2022
Ingram 出版Written by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 - An Introduction to In
-
Blockchain - Icbc 2022
Springer 出版This book constitutes the proceedings of the 5th International Conference on Blockchain, ICBC 2022,
-
Internet of Things - Iciot 2022
Springer 出版This book constitutes the proceedings of the 7th International Conference on Internet of Things, IC
-
Cognitive Computing - ICCC 2022
Springer 出版This book constitutes the proceedings of the International Conference on Cognitive Computing, ICCC
-
Emerging Information Security and Applications
Springer 出版This volume constitutes selected papers presented at the Third International Symposium on Emerging
-
The Small Business Owner's Guide to Protecting Your Business From Hackers
Ingram 出版As cybercrime continues to rise at an alarming rate, it is now more important than ever to ensure t
-
High Performance Computing. Isc High Performance 2022 International Workshops
Springer 出版This book constitutes the refereed conference proceedings of the workshops held at the 37th Interna
-
The Cyber Security Handbook
Ingram 出版In the world as we know it, you can be attacked both physically and virtually. For today's organisa
-
Imaginary Advice
Lulu.com 出版Lined creative writing journal. Contains one-hundred writing prompts. From author Ross Sutherland,
-
Network Design Cookbook
Lulu.com 出版Version 10.2.8 (August 2016) The Network Design Cookbook is a guide that provides a structured proc
-
Trusted Computing Platforms
Springer 出版Trusted Computing Platforms: Design and Applications is written for security architects, applicatio
-
Cyber Operations
Wiley 出版Cyber Operations A rigorous new framework for understanding the world of the future Information t
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Progress in Cryptology - Indocrypt 2022
Springer 出版The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYP
-
Java Memory Management
Packt 出版Improve application performance by tuning, monitoring and profiling both the garbage collector and
-
Marketing Thee Podcast 101
Lulu.com 出版You have a great podcast, purpose and concept good; that's what I like. Now, it's time to tell the
-
Full Stack Quarkus and React
Packt 出版Create and deploy standalone, fully functional, web applications using Quarkus and React Key Featur
-
-
Color Accessibility Workflows
Ingram 出版Color is a powerful tool that affords seemingly endless design possibilities, but we often design w
-
Making Sense of Color Management
Book Apart 出版Get clarity in the tricky endeavor of managing colors from initial design to final product. Learn w
-
The Wires of War
Ingram 出版From the former news policy lead at Google, an "informative and often harrowing wake-up call" (Publ
-
-
Information, Communication and Computing Technology
Springer 出版This book constitutes proceedings of the 7th International Conference on Information, Communication
-
-
-
Responsible Graph Neural Networks
Ingram 出版More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-s
-
Information Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the 27th Australasian Conference on Information S
-
Information Security
Springer 出版This book constitutes the proceedings of the 25th International Conference on Information Security,
-
Applications and Usability of Interactive TV
Springer 出版This book constitutes thoroughly refereed and revised selected papers from the 10th Iberoamerican C
-
Theory of Cryptography
Springer 出版The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of
-
Theory of Cryptography
Springer 出版The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of
-
Network and Parallel Computing
Springer 出版This book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network
-
Blockchain, Artificial Intelligence, and the Internet of Things
Springer 出版This book provides basic concepts and deep knowledge about various security mechanisms that can be
-
Secure It Systems
Springer 出版This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems,
-
Advanced PHP Strings
Lulu.com 出版Working with multibyte strings, Unicode, and UTF-8 can feel intimidating when writing PHP. Advanced
-
Computer Security - Esorics 2022
Springer 出版The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symp
-
Security Architecture - How & Why
Ingram 出版Security Architecture, or Enterprise Information security architecture, as it was originally coined
-
Frontiers in Cyber Security
Springer 出版This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in
-