-
Managing Security Services in Heterogenous Networks
Ingram 出版A heterogeneous network is a network which connects computers and other devices with different oper
-
High Performance Computing
Springer 出版This book constitutes the proceedings of the 9th Latin American Conference on High Performance Comp
-
Machine Learning Security Principles
Packt 出版Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obt
-
Emerging Technologies for Authorization and Authentication
Springer 出版This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Tech
-
Data Privacy Management, Cryptocurrencies and Blockchain Technology
Springer 出版This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 In
-
Closing the Loop
Ingram 出版As design continues to impact our products, services, and solutions at scale, it is more important
-
Information Security Applications
Springer 出版This book constitutes the revised selected papers from the 23rd International Conference on Informa
-
Microelectronic Devices, Circuits and Systems
Springer 出版This book constitutes the proceedings of the Third International Conference on Microelectronic Devi
-
Cloud Auditing Best Practices
Packt 出版Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to
-
The Power of Podcasting
Ingram 出版Now two decades old, podcasting is an exuberant medium where new voices can be found every day. As
-
The Power of Podcasting
Ingram 出版Now two decades old, podcasting is an exuberant medium where new voices can be found every day. As
-
Emotions Online
Routledge 出版Digital media have become deeply immersed in our lives, heightening both hopes and fears of their a
-
Data Encryption Standard (DES) and Issues of DES and its Replacement
Ingram 出版Scientific Essay from the year 2022 in the subject Computer Science - IT-Security, grade: 75%, lang
-
Blockchain Technology and Application
Springer 出版This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 202
-
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Wiley 出版APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensi
-
Computer Performance Engineering
Springer 出版This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performanc
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 21st International Conference on Smart Card Research a
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Digital Forensics and Watermarking
Springer 出版This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
The Art of Sxo
Apress 出版Search Experience Optimization (SXO) is a fast growing field that combines the disciplines of Searc
-
Microsoft Cybersecurity Architect Exam Ref SC-100
Packt 出版Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day c
-
Information Systems Security
Springer 出版This book constitutes the refereed proceedings of the18th International Conference on Information S
-
-
Semantic Similarity from Natural Language and Ontology Analysis
Springer 出版Artificial Intelligence federates numerous scientific fields in the aim of developing machines able
-
Cyber Security
Ingram 出版Cyber security has never been more essential than it is today, it's not a case of if an attack will
-
Koncepts of Numbers in Quantitative Aptitude in CAT GMAT XAT CMAT MAT & Bank PO 3rd Edition
Ingram 出版The importance of Working with Numbers has increased tremendously in all Aptitude based tests in th
-
High Performance with Laravel Octane
Packt 出版Explore tools, techniques, and practices to remove performance bottlenecks and enhance the stabilit
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Network and
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! In this book you wil
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AN
-
Security, Privacy, and Applied Cryptography Engineering
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Security, Pr
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND
-
Supercharging Node.js Applications with Sequelize
Packt 出版A hands-on implementation guide to application development in Node.js using the powerful Sequelize
-
Applied Intelligence and Informatics
Springer 出版This book constitutes the refereed proceedings of the Second International Conference on Applied In
-
Network Automation with Go
Packt 出版Understand the world of modern network automation with Go and deepen your knowledge with insights f
-
Cloud Identity Patterns and Strategies
Packt 出版Get to grips with identity patterns and design a structured enterprise identity model for cloud app
-
React Application Architecture for Production
Packt 出版A hands-on guide to help you develop skills and confidence in building and structuring React applic
-
Winning the National Security AI Competition
Apress 出版In introducing the National Security Commission on AI's final report, Eric Schmidt, former Google C
-
PCI Compliance
Ingram 出版The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is conti
-
Silicon Valley Cybersecurity Conference
Springer 出版This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cy
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Mathematical Modeling and Supercomputer Technologies
Springer 出版This book constitutes selected and revised papers from the 22nd International Conference on Mathema
-
Network Programming with Linux
Ingram 出版To construct today's distributed, network applications and services, you really want profound domin
-
The Magic Visual
Lulu.com 出版Making images will help you get noticed in any medium. The Magic Visual will teach you the how and
-
Secret Admirer
Ingram 出版This book will explain the origins and details of the 'parasocial relationship.'