-
Mastering Minimal APIs in ASP.NET Core
Packt 出版Get a practical understanding of how to build lightweight ASP.NET Core applications and write clean
-
Software Architecture for Web Developers
Packt 出版Discover an accessible pathway to advancing your career and becoming a web architect by building a
-
Computer and Communication Engineering
Springer 出版This book constitutes refereed proceedings of the 2nd International Conference on Computer and Comm
-
Practical Ansible
Apress 出版Get ready to go from the basics of using Ansible to becoming proficient at implementing configurati
-
Ransomware and Cyber Extortion
Addison-Wesl 出版Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and ot
-
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
Springer 出版This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the
-
Online Predators, an Internet Insurgency
The key to preventing online child predation is Stakeholder Involvement. Parents and guardians need
-
Advances in Digital Forensics XVII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Enterprise-Grade It Security for Small and Medium Businesses
Apress 出版Understand the IT security features that are needed to secure the IT infrastructure of a small to m
-
Digital Distress
Ingram 出版Digital Distress is the first book of its kind to focus specifically on Gen Z, highlighting how chi
-
Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy
Springer 出版This book constitutes the refereed proceedings of the 7th China Conference on Knowledge Graph and S
-
Learning Digital Identity
Ingram 出版Why is it difficult for so many companies to get digital identity right? If you're still wrestling
-
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
Springer 出版This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the
-
Virtual Private Networks
Ingram 出版This book explains how to plan and build a Virtual Private Network (VPN), a collection of technolog
-
The Accidental Community Manager
Ingram 出版New to the world of managing online communities? Worried that you have no community experience or d
-
SpamAssassin
Ingram 出版The annoyance factor for individual users whose email is crammed with pitches for pornography, absu
-
Software Product Management
Springer 出版Software Product Management (SPM) is a key success factor for software products and software-intens
-
Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Ingram 出版For ensuring a software system's security, it is vital to keep up with changing security precaution
-
Pro Angular
Apress 出版Welcome to this one-stop shop for learning Angular. Pro Angular is the most concise and comprehensi
-
Statistical Methods for Speech Recognition
Mit Press 出版This book reflects decades of important research on the mathematical foundations of speech recognit
-
Statistical Analysis of Networks
Ingram 出版This book is a general introduction to the statistical analysis of networks, and can serve both as
-
Machine Learning for Text
Springer 出版1 An Introduction to Text Analytics.- 2 Text Preparation and Similarity Computation.- 3 Matrix Fact
-
Mastering React Test-Driven Development - Second Edition
Packt 出版Learn test-driven and behavior-driven development techniques that will give you greater confidence
-
Responsive Web Design with HTML5 and CSS - Fourth Edition
Packt 出版Harness the latest capabilities of HTML5 and CSS to create a single UI that works flawlessly on mob
-
Technological Innovation for Applied AI Systems
Springer 出版This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Computer Science - Cacic 2021
Springer 出版This book constitutes revised selected papers from the 27th Argentine Congress on Computer Science,
-
Mind the Tech Gap
Ingram 出版IT and cybersecurity teams have had a long-standing battle between functionality and security. But
-
Pki Implementation and Infrastructures
Ingram 出版The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand
-
Cloud Attack Vectors
Apress 出版Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed
-
-
Mind the Tech Gap
Ingram 出版IT and cybersecurity teams have had a long-standing battle between functionality and security. To u
-
Pki Implementation and Infrastructures
Ingram 出版This book explores all the aspects of implementing and maintaining a PKI and reflects decades of ha
-
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
Democratizing Cryptography
Ingram 出版In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovati
-
Democratizing Cryptography
Ingram 出版In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovati
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
-
5g-Enabled Internet of Things
Ingram 出版How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolut
-
Social Media Income
Ingram 出版Do you think you must have thousands of followers to make money on social media?Some would say so,
-
iMARKET Handbook
Ingram 出版Social media marketing is by far the most cost-effective targeting campaign available, but only whe
-
Information and Software Technologies
Springer 出版This book constitutes the refereed proceedings of the 28th International Conference on Information
-
Demystifying Ansible Automation Platform
Packt 出版Explore Ansible Automation Platform and understand how the different pieces interact to standardize
-
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems
Springer 出版This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimb
-
Disinformation in Open Online Media
Springer 出版This book constitutes the refereed proceedings of the 4th Multidisciplinary International Symposium
-
Financial Cryptography and Data Security
Springer 出版This book constitutes revised selected papers from the proceedings of the 26th International Confer
-
Information and Communication Technologies
Springer 出版This book constitutes refereed proceedings of the 10th Ecuadorian Conference on Information and Com