-
The Cybersecurity Self-Help Guide
CRC Press 出版Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are be
-
The the Cybersecurity Self-Help Guide
CRC Press 出版Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are be
-
The Ciso's Transformation
Springer 出版The first section of this book addresses the evolution of CISO (chief information security officer)
-
Cybersecurity Issues in Emerging Technologies
Ingram 出版The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing att
-
Partially Homomorphic Encryption
Springer 出版Introduction.- Mathematical Background.- Rivest-Shamir-Adleman Algorithm.- Goldwasser-Micali Algori
-
Blockchain
Ingram 出版Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutioni
-
Datenschutzanalyse, Folgenabsch瓣tzung und Gew瓣hrleistung eines besseren Datenschutzes f羹r definierte Gesch瓣ftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
Ingram 出版Masterarbeit aus dem Jahr 2019 im Fachbereich Informatik - IT-Security, Note: 1,3, Fachhochschule T
-
Computer Security - ESORICS 2021
Springer 出版The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on
-
Performance Modeling and Analysis of Communication Networks
Ingram 出版This textbook provides an introduction to common methods of performance modeling and analysis of co
-
Pro Data Visualization Using R and JavaScript
Apress 出版Use R 4, RStudio, Tidyverse, and Shiny to interrogate and analyze your data, and then use the D3 Ja
-
Digital Twin Technology
Ingram 出版Most of the business sectors consider the Digital Twin concept as the next big thing in the industr
-
.Net Framework Programmer’s Reference
Ingram 出版This guide provides developers with a complete overview of the .NET architecture. It contains defin
-
Accelerating Angular Development with Ivy
Packt 出版Get a comprehensive introduction to the major Angular framework rewrite known as Angular IvyKey Fea
-
Corporate Cybersecurity
Ingram 出版CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities
-
Networking A to Z
Ingram 出版This volume covers the key concepts and technologies of Local Area Networking in 100 three- to five
-
-
I-Mode Crash Course
Ingram 出版i-mode is NYY SoCoMo's mobile Internet access system. It allows users to access email, weather, sto
-
Wireless Internet Crash Course
Ingram 出版This text provides a crash course in the wireless Internet. WAP, SMS, i-mode, and Bluetooth are all
-
Thomas' Telecom & Networking Dictionary
Ingram 出版This reference for engineers involved in networking and communications is arranged alphabetically t
-
Create! Photoshop Elements 2
Ingram 出版This introductory guide aims to help the reader learn to perform all kinds of image editing tasks,
-
Security without Obscurity
Ingram 出版Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three oth
-
Principles of Information Security
The practice of protecting information by eliminating or reducing information risks is termed as in
-
Privilege Escalation Techniques
Packt 出版Enumerate and exploit Linux or Windows systems and escalate your privileges to the highest levelKey
-
Science of Cyber Security
Springer 出版This book constitutes the proceedings of the Third International Conference on Science of Cyber Sec
-
Information and Software Technologies
Springer 出版This book constitutes the refereed proceedings of the 27th International Conference on Information
-
Recent Advances in Cryptography and Network Security
Ingram 出版In the field of computers and with the advent of the internet, the topic of secure communication ha
-
5G Simply In Depth
Ingram 出版● The fifth generation of wireless access technology (5G) is facing a daunting task of meetin
-
Snowflake Security
Apress 出版This book is your complete guide to Snowflake security, covering account security, authentication,
-
Information, Communication and Computing Technology
Springer 出版This book constitutes the refereed proceedings of the 6th International Conference on Information,
-
Cyber Defense Mechanisms
Ingram 出版This book discusses the evolution of security and privacy issues and brings related technological t
-
Practical Svelte
Apress 出版Learn to leverage the power of Svelte to produce web applications that are efficient and fast. This
-
Computer Security - ESORICS 2021
Springer 出版The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on
-
Digital Twin Technology
Ingram 出版Most of the business sectors consider the Digital Twin concept as the next big thing in the industr
-
Facehooked
Ingram 出版The number of Facebook users worldwide exceeded one billion in August of 2012. With the increase in
-
Access Control Management in Cloud Environments
Springer 出版This textbook introduces new business concepts on cloud environments such as secure, scalable anony
-
Effective Platform Product Management
Packt 出版Turn your platform into the next big thing with expert advice to scale and implement a proven growt
-
The Art of Modern PHP 8
Packt 出版Discover how to apply the principles of OOP, types, and package management the right wayKey Feature
-
Progress in Cryptology - LATINCRYPT 2021
Springer 出版This book constitutes the proceedings of the 7th International Conference on Cryptology and Informa
-
Quantum Cryptography in Advanced Networks
Ingram 出版Proposed 35 years ago, quantum cryptography (QC) and its most prominent part quantum key distributi
-
Partition-Based Trapdoor Ciphers
Ingram 出版Block encryption algorithms are now the most widely used cipher systems in the world to protect our
-
-
Digital Media, Sharing and Everyday Life
Routledge 出版Digital Media, Sharing and Everyday Life provides nuanced accounts of the processes of sharing in d
-
Algorithmic Short Selling with Python
Packt 出版Leverage Python source code to revolutionize your short selling strategy and to consistently make p
-
The Beasts of Ephesus..
Ingram 出版This work has been selected by scholars as being culturally important and is part of the knowledge
-
Ghosts, Robots, Automatic Writing
Ingram 出版As language generating AI grows more sophisticated, new questions arise (and old questions take on
-
Python Microservices Development - Second Edition
Packt 出版Use Python microservices to craft applications that are built as small standard units using proven
-
Efficient Fuzzing. Wie es bestehende Teststrategien effizient erg瓣nzen kann
Ingram 出版Akademische Arbeit aus dem Jahr 2021 im Fachbereich Informatik - IT-Security, Note: 1 (90%), Verans
-
Network Games, Control and Optimization
Springer 出版This book constitutes the conference proceedings of the 10th International Conference on Network Ga