-
Edge Computing Systems with Kubernetes
Packt 出版Understand how to use K3s and k3OS for different use cases and discover best practices for building
-
Secure Web Application Development
Apress 出版Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), e
-
Network Connectivity
Springer 出版Networks naturally appear in many high-impact domains, ranging from social network analysis to dise
-
Cybersecurity - Attack and Defense Strategies - Third Edition
Packt 出版Updated edition of the bestselling guide for planning attack and defense strategies based on the cu
-
Blockchain for Real World Applications
Wiley 出版Blockchain for Real World Applications A comprehensive examination of blockchain architecture and i
-
Advanced Research in Technologies, Information, Innovation and Sustainability
Springer 出版The two-volume Proceedings set CCIS 1675 and 1676 constitutes the refereed proceedings of the Secon
-
Science of Cyber Security - Scisec 2022 Workshops
Springer 出版This volume constitutes the papers of several workshops which were held in conjunction with the 4th
-
Mastering Minimal APIs in ASP.NET Core
Packt 出版Get a practical understanding of how to build lightweight ASP.NET Core applications and write clean
-
Software Architecture for Web Developers
Packt 出版Discover an accessible pathway to advancing your career and becoming a web architect by building a
-
Computer and Communication Engineering
Springer 出版This book constitutes refereed proceedings of the 2nd International Conference on Computer and Comm
-
Practical Ansible
Apress 出版Get ready to go from the basics of using Ansible to becoming proficient at implementing configurati
-
Ransomware and Cyber Extortion
Addison-Wesl 出版Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and ot
-
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
Springer 出版This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the
-
Online Predators, an Internet Insurgency
Ingram 出版The key to preventing online child predation is Stakeholder Involvement. Parents and guardians need
-
Advances in Digital Forensics XVII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Enterprise-Grade It Security for Small and Medium Businesses
Apress 出版Understand the IT security features that are needed to secure the IT infrastructure of a small to m
-
Digital Distress
Ingram 出版Digital Distress is the first book of its kind to focus specifically on Gen Z, highlighting how chi
-
Big Data and Social Computing
Springer 出版This book constitutes refereed proceedings of the 7th China National Conference on Big Data and Soc
-
Robotics, Computer Vision and Intelligent Systems
Springer 出版This volume constitutes the papers of two workshops which were held in conjunctionwith the First In
-
Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy
Springer 出版This book constitutes the refereed proceedings of the 7th China Conference on Knowledge Graph and S
-
Learning Digital Identity
Ingram 出版Why is it difficult for so many companies to get digital identity right? If you're still wrestling
-
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
Springer 出版This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the
-
Virtual Private Networks
Ingram 出版This book explains how to plan and build a Virtual Private Network (VPN), a collection of technolog
-
The Accidental Community Manager
Ingram 出版New to the world of managing online communities? Worried that you have no community experience or d
-
SpamAssassin
Ingram 出版The annoyance factor for individual users whose email is crammed with pitches for pornography, absu
-
Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Ingram 出版For ensuring a software system's security, it is vital to keep up with changing security precaution
-
Software Product Management
Springer 出版Software Product Management (SPM) is a key success factor for software products and software-intens
-
Statistical Methods for Speech Recognition
Mit Press 出版This book reflects decades of important research on the mathematical foundations of speech recognit
-
Pro Angular
Apress 出版Welcome to this one-stop shop for learning Angular. Pro Angular is the most concise and comprehensi
-
Statistical Analysis of Networks
Ingram 出版This book is a general introduction to the statistical analysis of networks, and can serve both as
-
Machine Learning for Text
Springer 出版1 An Introduction to Text Analytics.- 2 Text Preparation and Similarity Computation.- 3 Matrix Fact
-
Mastering React Test-Driven Development - Second Edition
Packt 出版Learn test-driven and behavior-driven development techniques that will give you greater confidence
-
Responsive Web Design with HTML5 and CSS - Fourth Edition
Packt 出版Harness the latest capabilities of HTML5 and CSS to create a single UI that works flawlessly on mob
-
Technological Innovation for Applied AI Systems
Springer 出版This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Computer Science - Cacic 2021
Springer 出版This book constitutes revised selected papers from the 27th Argentine Congress on Computer Science,
-
Mind the Tech Gap
Ingram 出版IT and cybersecurity teams have had a long-standing battle between functionality and security. But
-
Pki Implementation and Infrastructures
Ingram 出版The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand
-
Beginning Ansible Concepts and Application
Apress 出版Learn the concepts and develop the skills to be a true Ansible artist and use it inside and outside
-
Cloud Attack Vectors
Apress 出版Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed
-
Pki Implementation and Infrastructures
Ingram 出版The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand
-
Mind the Tech Gap
Ingram 出版IT and cybersecurity teams have had a long-standing battle between functionality and security. But
-
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
Democratizing Cryptography
Ingram 出版In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovati
-
Democratizing Cryptography
Ingram 出版In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovati
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
The Personal Finance Guide for Tech Professionals
Apress 出版Gain a basic foundation of essential personal finance issues and strategies, specifically geared to