-
New Trends in Information and Communications Technology Applications
Springer 出版This book constitutes refereed proceedings of the 5th International Conference on New Trends in Inf
-
Digital Forensic Investigation of Internet of Things (IoT) Devices
Springer 出版This book provides a valuable reference for digital forensics practitioners and cyber security expe
-
Foundations of Ajax
Apress 出版Ajax is hot news for developers! With examples like Google Maps, Google Suggest, Gmail, and Tada Li
-
Pro DNS and Bind
Apress 出版Pro DNS and BIND guides readers through the often challenging array of features surrounding DNS wit
-
Critical Infrastructure Protection XV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
-
Parenting for the Digital Generation
Ingram 出版Provides a practical handbook for parents, grandparents, teachers, and counselors who want to under
-
Cyber Crisis Management
Springer 出版Cyber attacks and IT breakdowns threaten every organization. The incidents accumulate and often for
-
Complexity = Corruption Big Tech 5
Ingram 出版The Big Tech 5 are like one giant octopus, with tentacles invading every aspect of our lives. Octop
-
Encyclopedia of Crash Dump Analysis Patterns, Volume 1, A-J
Ingram 出版This reference reprints with corrections, additional comments, and classification more than 370 alp
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 15th International Conference on Network and
-
Cybersecurity Leadership Demystified
Packt 出版Gain useful insights into cybersecurity leadership in a modern-day organization with the help of us
-
Encyclopedia of Crash Dump Analysis Patterns, Volume 2, L-Z
Ingram 出版This reference reprints with corrections, additional comments, and classification more than 370 alp
-
Memory Dump Analysis Anthology, Volume 5, Revised Edition
Ingram 出版This reference volume consists of revised, edited, cross-referenced, and thematically organized art
-
The Cybersecurity Mindset
Ingram 出版Securing an organization's assets and understanding the cybersecurity blueprint goes beyond the tec
-
The Cybersecurity Mindset
Ingram 出版Securing an organization's assets and understanding the cybersecurity blueprint goes beyond the tec
-
-
Navigating Hyperspace
Ingram 出版Like a hurricane that exposes the underlying bedrock--and an occasional hidden treasure--by washing
-
PocketFocus Notebook
Lulu.com 出版PocketFocus Notebooks are single-project notebooks for designers, marketers, artists, project manag
-
KI 2021: Advances in Artificial Intelligence
Springer 出版This book constitutes the refereed proceedings of the 44th German Conference on Artificial Intellig
-
Mediated Interfaces
Ingram 出版Images of faces, bodies, selves and digital subjectivities abound on new media platforms like Snapc
-
Critical Information Infrastructures Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Critical Inf
-
Communication, Networks and Computing
Springer 出版This book constitutes selected and revised papers presented at the Second International Conference
-
Redesigning Wiretapping
Springer 出版This book tells the story of government-sponsored wiretapping in Britain and the United States from
-
Cryptography and Coding
Springer 出版This book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptogr
-
Incremental Construction of Code Property Graphs
Ingram 出版Master's Thesis from the year 2021 in the subject Computer Science - IT-Security, grade: 2,0, Techn
-
Advanced Smart Computing Technologies in Cybersecurity and Forensics
Ingram 出版This book addresses the topics related to artificial intelligence, internet of things, blockchain t
-
Access, Resource Sharing and Collection Development
Routledge 出版This book, first published in 1996, explores the role of libraries in acquiring, storing, and disse
-
Agile Security Operations
Packt 出版Get to grips with security operations through incident response, the ATT&CK framework, active defen
-
Phishing and Communication Channels
Apress 出版Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email at
-
Critical Infrastructure Protection XIV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
60 Days to LinkedIn Mastery
Ingram 出版There's only one place in the world where you can find and connect with hundreds of millions of pro
-
Progress in Cryptology - Indocrypt 2021
Springer 出版This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology i
-
-
e-Learning in Medical Physics and Engineering
Ingram 出版This practical guide provides educators, programme administrators, and school directors with step-b
-
Conflict and Creativity at Work
Ingram 出版Contributes to the tide of activism that is calling for higher ethical standards and corporate soci
-
Cryptology and Network Security
Springer 出版This book constitutes the refereed proceedings of the 20th International Conference on Cryptology a
-
Bulletproof TLS and PKI, Second Edition
Ingram 出版Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure server
-
CISSP Examination Review Guide
Ingram 出版- The SEMAIS CISSP study guide aims to help testing candidates synthesize and summarize relevant CI
-
Securing 5g and Evolving Architectures
Addison-Wesl 出版SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the ben
-
Security and Trust Management
Springer 出版This book constitutes the proceedings of the 17th International Workshop on Security and Trust Mana
-
Information Systems Security
Springer 出版This book constitutes the proceedings of the 17th International Conference on Information Systems S
-
-
Software Design Patterns for Java Developers
Ingram 出版PracticeDesign Patterns to Enrich and Streamline Software DevelopmentKey FeaturesClassify design pa
-
Beginning React and Firebase
Apress 出版Use React with Firebase to build four beginner-friendly apps. A lot of React tutorials out there to
-
Computational Analysis of Storylines
Ingram 出版Event structures are central in Linguistics and Artificial Intelligence research: people can easily
-
Webflow by Example
Packt 出版Build modern responsive websites without writing code by making the most of the power and flexibili
-
Microsoft Sentinel in Action - Second Edition
Packt 出版Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event m