-
Instagram Marketing
Ingram 出版INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for
-
Grandad’s Secret Password Book
Lulu.com 出版A special gift for Grandad! A perfect logbook for storing your internet usernames and passwords. Th
-
Instagram Marketing
Ingram 出版INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for
-
Nan's Secret Password Book
Lulu.com 出版A special gift for Nan! A perfect logbook for storing your internet usernames and passwords. This h
-
Privacy-Preserving Deep Learning
Springer 出版Introduction.- Definition and Classification.- Background Knowledge.- X-based Hybrid PPDL.- The Gap
-
Vlsi-Soc: New Technology Enabler
Springer 出版This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 1
-
Selected Areas in Cryptography
Springer 出版This book contains revised selected papers from the 27th International Conference on Selected Areas
-
Applications and Usability of Interactive TV
Springer 出版This book constitutes the refereed proceedings of the 9th Iberoamerican Conference on Applications
-
Attribution of Advanced Persistent Threats
Ingram 出版An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer
-
Applied Cryptography and Network Security Workshops
Springer 出版This book constitutes the proceedings of the satellite workshops held around the 19th International
-
Threat Hunting with Elastic Stack
Packt 出版Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security featur
-
Deep Learning with fastai Cookbook
Packt 出版Harness the power of the easy-to-use, high-performance fastai framework to rapidly create complete
-
Get Good or Get Off
Ingram 出版Social media is a powerful set of tools, that can build your brand, connect you to your customers a
-
Practical Machine Learning for Computer Vision
Ingram 出版This practical book shows you how to employ machine learning models to extract information from ima
-
Future Access Enablers for Ubiquitous and Intelligent Infrastructures
Springer 出版This book constitutes the refereed post-conference proceedings of the 5th International Conference
-
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
Packt 出版A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for
-
Vlsi-Soc: Design Trends
Springer 出版This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 1
-
Quantum Algorithms for Cryptographically Significant Boolean Functions
Springer 出版1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover's Algorithm and Walsh Spectrum.-
-
Data and Applications Security and Privacy XXXV
Springer 出版This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data a
-
Tracing Attackers with Trust-Based Deterministic Packet Marking
Ingram 出版Computer network attacks are on the increase and are more sophisticated in today's network environm
-
Post-Quantum Cryptography
Springer 出版This volume constitutes the proceedings of the 12th International Conference on post-quantum crypto
-
Cryptography
Ingram 出版Despite its reputation as a language only of spies and hackers, cryptography plays a critical role
-
Resell Rights Questions Answered
Ingram 出版Exchange Rights can sound all "outsider" to you particularly in the event that you are new to the s
-
Handbook on wireless mesh network
Ingram 出版Wireless Mesh networks are more and more frequently seen as a solution to large-scale tracking and
-
Surveys That Work
Ingram 出版Surveys That Work explains a seven-step process for designing, running, and reporting on a survey t
-
Cloud Security Band 2
Ingram 出版Digitalisierung, Industrie 4.0 und Economy 4.0 sind Schlagworte, die unsere Gesellschaft und die Un
-
Mobility Management in CoAP-Based IoT Networks
Ingram 出版From recently, the innovative technology named as Constrained Application Protocol (CoAP) has been
-
Security in MANET’S by using Symmetric Key Cryptography
Ingram 出版The current textbook is about the security in mobile ad-hoc networks by using cryptographic secrete
-
Analyse des Datensatzes wage2 mit der Programmiersprache R
Ingram 出版Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - IT-Security, Note: 2,0, FOM Hochschule
-
Modernizing Enterprise CMS Using Pimcore
Packt 出版A practical guide to developing, administering, and scaling content management solutions in your or
-
The Little Book of Sitecore(R) Tips
Ingram 出版In Volume 2 I stated sequels are never as good, that means by this point you must be a sucker for p
-
IBM Watson Solutions for Machine Learning
Ingram 出版Utilize Python and IBM Watson to put real-life use cases into production. Key Features● Use
-
Social Media Marketing
Ingram 出版SOCIAL MEDIA MARKETINGToday, platforms like Facebook, Twitter, and Instagram are making it amazingl
-
Social Media Marketing
Ingram 出版SOCIAL MEDIA MARKETINGToday, platforms like Facebook, Twitter, and Instagram are making it amazingl
-
Not Just Chatting
Ingram 出版"Bravo! Who would have thought such a vast variety of ways to be entertained, educated, soothed, an
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 18th International Conference on Detection of Intrusio
-
Rapid Application Development with AWS Amplify
Packt 出版Get to grips with the AWS Amplify framework and use it to build scalable cloud-native progressive w
-
Innovations in Digital Economy
Springer 出版This book constitutes the revised and extended papers of the Second International Conference on Inn
-
Set Up Your Own Platform
Ingram 出版Wouldn't you like to have your own platform for your personal or business website instead of depend
-
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Advanced Cybersecurity Technologies
Ingram 出版Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet curren
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Cybersecurity and Third-Party Risk
Wiley 出版Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the l
-
Computer Safety, Reliability, and Security. Safecomp 2021 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the proceedings of the 40th International Conference on Computer Safety, Reli