-
Practical Memory Forensics
Packt 出版A practical guide to enhancing your digital investigations with cutting-edge memory forensics techn
-
Selected Areas in Cryptography
Springer 出版This book contains revised selected papers from the 28th International Conference on Selected Areas
-
Arduino programming
Ingram 出版DO YOUR CUSTOMERS WANT TO DISCOVER THE SECRETS BEHIND PYTHON DATA SCINCE?Are your customers looking
-
-
Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures and Applications
Ingram 出版This comprehensive book unveils the working relationship of blockchain and the fog/edge computing.
-
Privacy and Identity Management
Springer 出版This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
Understanding Blockchain and Cryptocurrencies
Ingram 出版Whether you are a project manager looking to lead blockchain projects, a developer who would like t
-
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Packt 出版Master key approaches used by real attackers to perform advanced pentesting in tightly secured infr
-
Privacy and Identity Management. Between Data Protection and Security
Springer 出版This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
Python Text Mining
Ingram 出版Natural Language Processing (NLP) has proven to be useful in a wide range of applications. Because
-
A Frontend Web Developer's Guide to Testing
Packt 出版Discover expert tips and best practices for maximizing the efficacy of various test automation fram
-
Java for Web Development
Ingram 出版Play around JavaBeans, NetBeans IDE, and build strong foundation of web development conceptsKey Fea
-
Wireless Security Architecture
Wiley 出版Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT se
-
Mastering Azure Security - Second Edition
Packt 出版Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries an
-
Wireless and Mobile Networking
Ingram 出版The book explains fundamental principles and protocols of key existing and emerging wireless networ
-
Computer Networking for Beginners
Ingram 出版Do you want to learn how to build your own computer network in a simple and effective way, even if
-
Transformers for Natural Language Processing - Second Edition
Packt 出版OpenAI's GPT-3, ChatGPT, GPT-4 and Hugging Face transformers for language tasks in one book. Get a
-
Cyber Mission Thread Analysis
Ingram 出版An important consideration when deciding to mitigate or accept a risk from a cyber attack to a weap
-
Cybersecurity and Local Government
Wiley 出版CYBERSECURITY AND LOCAL GOVERNMENT Learn to secure your local government's networks with this one-o
-
Auditing Corporate Surveillance Systems
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of b
-
How to Start a Podcast
Ingram 出版Everything you need to know about how to grow your own podcast today! Have you been struggling to
-
Verification and Evaluation of Computer and Communication Systems
Springer 出版This book constitutes the proceedings of the 15th International Conference on Verification an
-
Privacy-Preserving Machine Learning
Springer 出版This book provides a thorough overview of the evolution of privacy-preserving machine learning sche
-
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition
Packt 出版Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microso
-
Code-Based Cryptography
Springer 出版This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography,
-
Applications and Techniques in Information Security
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Applications
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 20th International Conference on Smart Card Research a
-
Big Data and Security
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Big Data an
-
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Ingram 出版The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses in
-
Competition and Restraint in Cyberspace
The authors discuss the need and potential for normative constraints on cyber aggression. They desc
-
Cloud Security Handbook
Packt 出版A comprehensive reference guide to securing the basic building blocks of cloud services, with actua
-
AI and Machine Learning for Network and Security Management
Ingram 出版AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Ke
-
Real-World Next.js
Packt 出版Learn how to use Next.js for building web apps without compromising performance, user experience, a
-
Ict for Health, Accessibility and Wellbeing
Springer 出版This book constitutes selected papers presented at the First International Conference on ICT for He
-
Artificial Intelligence, Blockchain, and Virtual Worlds
Ingram 出版Artificial Intelligence is already embedded in much of our daily lives and it's increasingly moving
-
Full Stack Development with Angular and GraphQL
Packt 出版Use tools such as Lerna and GraphQL Code Generator to leverage recent features like NPM Workspaces
-
Google Workspace User Guide
Packt 出版Explore the suite of apps that enhance productivity and promote efficient collaboration in your bus
-
Public-Key Cryptography - Pkc 2022
Springer 出版The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25t
-
Authorization and Access Control
Ingram 出版This book focuses on various authorization and access control techniques, threats and attack modeli
-
Public-Key Cryptography - Pkc 2022
Springer 出版The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25t
-
Implementing Devsecops with Docker and Kubernetes
Ingram 出版Building and securely deploying container-based applications with Docker and Kubernetes using open
-
Network Science
Springer 出版This book constitutes the refereed proceedings of the 7th International Conference and School of Ne
-
The Podcast Handbook
Ingram 出版This handbook is a comprehensive overview of the burgeoning podcast industry. It covers the history
-
Youtube Marketing 2022
Emmett Kim 出版Learn the Top Strategies for Rapidly Growing Your YouTube Channel in 2022 and Beyond. Even if you'v
-
Open Radio Access Network (O-Ran) Systems Architecture and Design
Ingram 出版Open Radio Access Network (O-RAN) Systems Architecture and Design gives a jump-start to engineers d
-
Zero Trust Networks
Ingram 出版This practical book provides a detailed explanation of the zero trust security model. Zero trust is
-
Web Penetration Testing
Ingram 出版Nothing is more important than preserving security on websites. Internet security is a constantly e
-