-
The User’s Journey
Ingram 出版Like a good story, successful design is a series of engaging moments structured over time. The User
-
Service Design
Ingram 出版Service Design is an eminently practical guide to designing services that work for people. It offer
-
Ich hacke Technik
Ingram 出版Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten H瓣lfte mein
-
Eye Tracking the User Experience
Ingram 出版Eye tracking is a widely used research method, but there are many questions and misconceptions abou
-
Penetration Testing Step By Step Guide
Ingram 出版This book is intended for people who have no prior knowledge of penetration testing, ethical hackin
-
Managing Chaos
Ingram 出版Few organizations realize a return on their digital investment. They're distracted by political inf
-
Content Everywhere
Ingram 出版Care about content? Better copy isn't enough. As devices and channels multiply-and as users expect
-
Practical Empathy
Ingram 出版Conventional product development focuses on the solution. Empathy is a mindset that focuses on peop
-
Build Better Products
Ingram 出版It's easier than ever to build a new product. But developing a great product that people actually w
-
Cyber-Physical Security for Critical Infrastructures Protection
Springer 出版This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physica
-
Why We Fail
Ingram 出版Just as pilots and doctors improve by studying crash reports and postmortems, experience designers
-
Digital Forensics and Watermarking
Springer 出版This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and
-
Cybersecurity ABCs
Ingram 出版Cybersecurity problems don't always relate to technological faults. Many can be avoided or mitigate
-
Security in Computing and Communications
Springer 出版This book constitutes revised selected papers of the 8th International Symposium on Security in Com
-
Information and Communication Technology and Applications
Springer 出版This book constitutes revised selected papers from the Third International Conference on Informatio
-
The #ArtOfTwitter
Ingram 出版MASTERING TWITTER IS THE MOST POWERFUL WAY TO GET YOUR VOICE HEARD AS A CREATIVE PROFESSIONAL In
-
The Theory of Hash Functions and Random Oracles
Springer 出版Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in
-
Modern Front-End Architecture
Apress 出版Learn how to build front-end applications that can help you ship applications faster with fewer def
-
Information Security and Cryptology
Springer 出版This book constitutes the post-conference proceedings of the 16th International Conference on Infor
-
Privacy and Identity Management. Data for Better Living: AI and Privacy
Springer 出版This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
CX Trinity
Ingram 出版CX Trinity explores three key facets of customer experience (CX): how we talk to customers, the con
-
Building Vue.js Applications with GraphQL
Packt 出版Take your Vue.js knowledge to the next level by understanding full-stack development concepts and e
-
Information Security and Cryptology - Icisc 2020
Springer 出版This book constitutes selected papers from the 23rd International Conference on Information Securit
-
Euro-Par 2020: Parallel Processing Workshops
Springer 出版This book constitutes revised selected papers from the workshops held at the 26th International Con
-
Guts: 8 Laws of Business from One of the Most Innovative Business Leaders of Our
John Wiley 出版"Guts" - Jetzt erscheint der Bestseller in der aktualisierten und 羹berarbeiteten 2. Auflage. Er en
-
Artificial Intelligence and Social Work
Ingram 出版This book marries social work and artificial intelligence to provide an introductory guide for usin
-
Data Protection Officer
Ingram 出版This book provides a practical guide to the DPO role, encompassing the key activities you'll need t
-
Cybersecurity for Connected Medical Devices
Ingram 出版The cybersecurity of connected medical devices is one of the biggest challenges facing healthcare t
-
Software-Defined Networks
Ingram 出版Software-Defined Networks (SDN) are transforming the Internet by replacing bundled, proprietary har
-
Advanced Natural Language Processing with TensorFlow 2
Packt 出版One-stop solution for NLP practitioners, ML developers and data scientists to build effective NLP s
-
Hybrid Encryption Algorithm Over Wireless Communication Channels
Ingram 出版This book presents novel hybrid encryption algorithms that possess many different characteristics.
-
AR and VR Using the Webxr API
Apress 出版Using a project-based approach, readers will see how to make the most of what spatial computing and
-
Pro Cryptography and Cryptanalysis
Apress 出版Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to imp
-
The Youtube Formula
Wiley 出版The Wall Street Journal bestseller!Comes with free online companion course Learn the secrets to get
-
Secret HistoryThe Story of Cryptology
Ingram 出版The first edition of this award-winning book attracted a wide audience. This second edition is both
-
Full-Stack Web Development with Jakarta Ee and Vue.Js
Apress 出版Harness the power of Jakarta EE to build sturdy back ends while applying Vue.js on the front end. T
-
Lurking
Picador USA 出版One of Esquire's Best Books to Elevate Your Reading List in 2020, , and a OneZero Best Tech Book o
-
-
Natural Language Processing
Ingram 出版With a machine learning approach and less focus on linguistic details, this gentle introduction to
-
Transformers for Natural Language Processing
Packt 出版Take your NLP knowledge to the next level and become an AI language understanding expert by masteri
-
Secure It Systems
Springer 出版This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems,
-
Foundations and Practice of Security
Springer 出版This book constitutes the revised selected papers of the 13th International Symposium on Foundation
-
Cross Layer Optimization for Protocols in Mobile Adhoc Networks
Ingram 出版Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Miscellaneous,
-
The Ransomware Threat Landscape
Ingram 出版The fastest-growing malware in the world The core functionality of ransomware is two-fold: to encry
-
Enterprise Information Security Risk Assessment
Ingram 出版This book is structured to focus on the practical implementation of risk assessment. The book is st
-
Mastering Linux Security
With the growing popularity of Linux, more and more administrators have started moving to the syste
-
Search Engine Optimization and Marketing
Ingram 出版This book explains the nuances of Search Engine Optimization (SEO) and Search Engine Marketing (SEM
-
IP Address Management, Second Edition
Ingram 出版Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologie