-
Society 5.0
Springer 出版This book constitutes revised and selected papers from the First International Conference on Societ
-
The Ultimate Guide to Snapchat
Ingram 出版Learn to use and understand the Snapchat app through this quick and simple insider's guide from a t
-
The Ultimate Guide to Snapchat
Ingram 出版Learnto use and understand the Snapchat app through this quick and simple insider'sguide from a top
-
Adobe Illustrator
Ingram 出版Com o Illustrator, a ferramenta de edi癟瓊o vetorial da Adobe, 矇 poss穩vel criar sofisticados trabalho
-
Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,7, Hochschule Albs
-
Digitale Sprachassistenten am Arbeitsplatz und ihr Weg zur Nutzerakzeptanz. Hindernisse und Treiber beim Anwender
Ingram 出版Masterarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1,3, FOM E
-
New Trends in Network Cyber Security (Part 1)
Ingram 出版Technology in the network security space has been through many dramatic changes recently. New mobil
-
Action Recognition
Ingram 出版* Updated in August, 2019 with color printing! * Research fields: Computer Vision and Machine Learn
-
Chancen und Risiken der k羹nstlichen Intelligenz. SWOT-Analyse und Anwendungsgebiete der Technologie
Ingram 出版Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 0,67, Spr
-
Penetration Testing Azure for Ethical Hackers
Packt 出版Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during c
-
Shopify Theme Customization with Liquid
Packt 出版Discover how to customize Shopify themes for your eCommerce websites with powerful tools and Liquid
-
-
The Identity Trade
Ingram 出版The successes and failures of an industry that claims to protect and promote our online identities
-
-
-
Threat Hunting in the Cloud
Wiley 出版Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice
-
8 Steps to Better Security
Wiley 出版Harden your business against internal and external cybersecurity threats with a single accessible r
-
TikTok Marketing
Lulu.com 出版The TikTok social media platform has seen explosive growth over the last two years. It now has 500
-
Financial Cryptography and Data Security. FC 2021 International Workshops
Springer 出版This book constitutes the refereed proceedings of four workshops held at the 25th International Con
-
Electronic Voting
Springer 出版This book constitutes the proceedings of the 6th International Conference on Electronic Voting, E-V
-
97 Things Every Information Security Professional Should Know
Whether you're searching for new or additional opportunities, information security can be vast and
-
Cryptography and Cryptanalysis in MATLAB
Apress 出版Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use.
-
Creating an Information Security Program from Scratch
Ingram 出版This book is written for the first security hire in an organization, either an individual moving in
-
Master content workbook
Lulu.com 出版"I post on social media everyday but I'm still not getting sales and I don't understand why" If thi
-
Mern Projects for Beginners
Apress 出版Learn how to use the MERN stack (MongoDB, Express.js, React, and Node) to build five fully function
-
Cybsersecurity Fundamentals 1
Lulu.com 出版Do you know a hacker can access your real life from your virtual life data! Now a day's data breach
-
Deep Learning for EEG-Based Brain-Computer Interfaces
Ingram 出版Deep Learning for EEG-Based Brain-Computer Interfaces is an exciting book that describes how emergi
-
Linux for Networking Professionals
Packt 出版Get to grips with the most common as well as complex Linux networking configurations, tools, and se
-
Security and Microservice Architecture on Aws
Ingram 出版Security is usually an afterthought when organizations design microservices for cloud systems. Most
-
Nutzen und Potential von K羹nstlicher Intelligenz
Ingram 出版Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1.0, AKAD
-
Designing Secure Systems
Ingram 出版Modern systems are an intertwined mesh of human process, physical security, and technology. Attacke
-
Disinformation in Open Online Media
Springer 出版This book constitutes the refereed proceedings of the Third Multidisciplinary International Symposi
-
Cyber Forensics
Ingram 出版Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are emplo
-
Cyber Forensics
CRC Press 出版Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are emplo
-
DelphiMVCFramework - the official guide
Lulu.com 出版Leverage the power of REST and JSON-RPC using the most popular framework for Delphi
-
It’s Your Digital Life
Ingram 出版This book intends to develop cyber awareness and technical knowledge in anyone who is interested in
-
It's Your Digital Life
Ingram 出版This book intends to develop cyber awareness and technical knowledge in anyone who is interested in
-
Microsoft Azure Security Technologies Certification and Beyond
Packt 出版Learn how to implement multi-layered security controls to protect against rapidly evolving threats
-
On the security of TLS 1.2 and TLS 1.3. A comparison
Ingram 出版Seminar paper from the year 2021 in the subject Computer Science - IT-Security, grade: 95%, Ruhr-Un
-
Trust, Privacy and Security in Digital Business
Springer 出版This volume LNCS 12927 constitutes the papers of the 18th International Conference on Trust, Privac
-
The Official (Isc)2 Cissp Cbk Reference
Ingram 出版The only official, comprehensive reference guide to the CISSP Thoroughly updated for 2021 and beyon
-
Certified Ethical Hacker (Ceh) Preparation Guide
Apress 出版Know the basic principles of ethical hacking. This book is designed to provide you with the knowled
-
Practical Enterprise React
Apress 出版Learn to write a real-world enterprise app using the fundamentals of React and the most popular Rea
-
Cuentos de la abuelita
Lulu.com 出版Cuentos, poes穩as y fabulas que relata la autora se encuentran este libro escrito con mucho amor. La
-
An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks
Ingram 出版Master's Thesis from the year 2013 in the subject Computer Science - Internet, New Technologies, gr
-
The Asimovian Rules and to what Extent They Can Lead to a Leakproof Singularity. Using the Example of the TV Series Westworld
Grin Verlag 出版Seminar paper from the year 2019 in the subject Computer Sciences - Artificial Intelligence, grade:
-
API Testing and Development with Postman
Packt 出版Explore the world of APIs and learn how to integrate them the production-ready applications using P
-
Dare to Share
Ingram 出版In a world full of noise, how can you get your voice heard?Guesting on podcasts is a great way to d