-
Discovering Internet
The words you provided shed light on a truth we all know deep down-the ever-increasing importance a
-
-
Software Agents Based Web Data Mining
Ingram 出版Software Agents Based Web Data Mining: An Intelligent Approach is the topic of research. Web data m
-
The Peep & Squeak Easy-to-Read Password Assistance Book
Tagger Press 出版An easy-to-read large font book to store passwords and other important information that is importan
-
Coercion - Resistant and Verifiable E-Voting System
A coercion-resistant and verifiable e-voting system is a sophisticated electronic voting system des
-
The Peep and Squeak Password Assistance Book
Tagger Press 出版With enough space to record usernames, passwords, and security questions, this book will help you k
-
Online Social Networks with Computational Intelligence
Ingram 出版The focuses on understanding the concept of opinion leaders within online social networks, employin
-
understanding google
Ingram 出版This thesis explores the impact of search engines within contemporary digital culture and, in parti
-
Contagion Source Detection in Epidemic and Infodemic Outbreaks
Ingram 出版The rapid spread of infectious diseases and online rumors share similarities in terms of their spee
-
Building in Security at Agile Speed
Ingram 出版Today's high-speed and rapidly changing development environments demand equally high-speed security
-
Gradient Expectations
Mit Press 出版An insightful investigation into the mechanisms underlying the predictive functions of neural netwo
-
Jeff Duntemann’s Drive-By Wi-Fi Guide
Provides everything Wi-Fi users need to know to design, build, protect, and extend a Wi-Fi wireless
-
Dreamweaver 4 F/X and Design
Dreamweaver? 4 f/x and Design improves, enriches, and builds upon the reader's current Dreamweaver
-
ASP.NET 2.0 Black Book
The ASP.Net 2.0 Black Book features immediate solutions that provide hands-on real-world techniques
-
Cisco Network Security Little Black Book
With this concise, problem-solving guide you will learn how to identify network security threats an
-
Dreamweaver 8: The Missing Manual
Available for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and
-
Dreamweaver 4 Visual Insight
Readers will learn how to convert text files to Web pages, add/edit Web pages images, make global c
-
SAP Access Control
Ingram 出版Manage on-premise user access with this comprehensive guide to SAP Access Control. Begin with step-
-
Dreamweaver Cs3: The Missing Manual
Welcome to Dreamweaver CS3. This new version of the popular web design software offers a rich envir
-
Securing the Internet of Things Environment against RPL Attacks
Self Publish 出版Kevin Ashton first coined the term Internet of Things in his presentation on automating the supplyc
-
Outrage Machine
Legacy Lit 出版Amazon's Best History Book of the Month for July 2023 An invaluable guide to understanding how th
-
Internet access problems
Mobile telephony and the Internet reign supreme in the communications landscape in every corner of
-
Professional Security Management
Routledge 出版Historically, security managers have tended to be sourced from either the armed forces or law enfor
-
-
Wordpress All-In-One for Dummies
For Dummies 出版The no-nonsense guide to building your own WordPress site With the help of WordPress All-in-One F
-
-
The Dark Cloud
Scribe Us 出版A gripping new investigation into the underbelly of digital technology, which reveals not only how
-
The study is titled ”SELF-TEL ARCHITECTURE BASED FAULT IDENTIFICATION AND DELAY AWARE DATA MANAGEMENT FOR IOT MOBILE EDGE ENVIRONMENT
Ingram 出版The Internet of Things (IoT) enables autonomous, predictive, and real-time sensing and monitoring o
-
Towards Design and Development of Secure and Privacy-Preserving Frameworks for IOT-enabled Networks
With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is buil
-
Perception of Cyber Security
This book extends the presentation of overview of the cyber security today, its common perception t
-
Improving Lifetime Of WSN Using Bio-Inspired Flower Pollination
The Internet of Things is a evolving network linking the physical world with the cyber world. Every
-
In-Band Full-Duplex Radios in 6G Networks
Ingram 出版Sixth-generation (6G) wireless communication networks will transform connected things in 5G into co
-
Multicast Authentication Scheme for Energy Conservation
Ingram 出版Conventional methods used in batch signature verification not distinguished between static node sig
-
Concise Encyclopedia of Coding Theory
Ingram 出版Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematic
-
Democracy In The Age Of Social Media
Democracy in the Age of Social Media The emergence and widespread use of social media have transfor
-
Honeynetcloud Investigation Model for IoT Forensics
Cyber Forensics, the science of cyber-criminal investigation to detect the nature and type of crime
-
Sister Nivedita Exploring Social And Political Ideals
Sister Nivedita: Exploring Social and Political Ideals Sister Nivedita, born Margaret Elizabeth Nob
-
How Social Media Affects Future Teacher’s Well Being
This study aims to delve into the complex relationship between social media and the well-being of f
-
Heuristics for Friendship Selection in Social Internet of Things
Heuristics for friendship selection in the Social Internet of Things (SIoT) refer to the guiding pr
-
LPI Security Essentials Study Guide
Sybex 出版Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study
-
Applied Cryptography and Network Security
Springer 出版The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st Inter
-
Deep Learning
Ingram 出版The book is structured around the following key topics: fundamentals of neural networks, convolutio
-
Energy Aware Balanced Routing in WSN using Genetic Algorithms
Ingram 出版A sensor network is a structure that comprised of sensing, computing, and communication elements th
-
Cross Layer Network Design
Ingram 出版Mobile Ad-hoc networks (MANETs) are the collection of two or more nodes can communicate with each o
-
How I Rob Banks
Wiley 出版Follow FC as he steals from the world's most secure banks and government facilities--without breaki
-
The implementation of security in a LAN/IP network
This work has 107 pages and 5 paragraphs Methods of configuration of cisco equipment, Administrativ
-
Blockchain-based Cheque Processing Framework with Smart Contracts
"Blockchain-based Cheque Processing Framework with Smart Contracts" by Sheetal presents a new appro
-
Cyber warfare and the need for regulation
Cyber warfare refers to the use of digital technology to carry out attacks against individuals, org