-
Introduction to the Darknet
Ingram 出版The Dark Web by Martin Hoffer is the essential and insightful read you have longed for. A detailed
-
Tor Anonymity Network 101
Ingram 出版Tor Anonymity Network 101 If you have been searching for how to access the most private and secure
-
How to Destroy Surveillance Capitalism
Ingram 出版OneZero, Medium's official technology publication, is thrilled to announce a print-on-demand editio
-
Shosple Colupis
Lulu.com 出版This series of illustrations intend to be a testimony of the social network time we are living thro
-
The Smartest Person in the Room
Ingram 出版#1 Bestseller by leadership & cybersecurity expert Christian Espinosa that unveils a simple powerfu
-
ASP.NET Core 5 and React - Second Edition
Packt 出版Build fully functional, cloud-ready, and professional web applications using the latest features in
-
Practical Threat Intelligence and Data-Driven Threat Hunting
Packt 出版Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert t
-
Virtual Foreplay
Ingram 出版Entering the world of online dating can be daunting and even dangerous. Virtual Foreplay addresses
-
High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production
Springer 出版This book constitutes selected revised and extended papers from the 10th International Conference o
-
Up and Running Google AutoML and AI Platform
Ingram 出版Learn how to work towards making the most out of a career in emerging tech Key Features Understand
-
Engineering Software As a Service
Ingram 出版NOTE: This is the Beta of the 2nd Edition. Some content may change orbe added until May 2021. See h
-
Aws Certified Security Study Guide
Ingram 出版Get prepared for the AWS Certified Security Specialty certification with this excellent resource B
-
Die Dreiaktstruktur in Malotkis ”Verschlusssache KI2015”. Zum Kontrast von K羹nstlicher Intelligenz in H繹rspielen
Ingram 出版Studienarbeit aus dem Jahr 2019 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 2,0, Hoch
-
Cloud Computing. Eignet sich die Etablierung von Cloud-L繹sungen in Unternehmen?
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - Internet, neue Technologien, Note: 1,2,
-
Ciberseguridad
Ingram 出版Si quiere descubrir c籀mo protegerse a s穩 mismo, a su familia y a su empresa de los ciberataques, en
-
Digital Contention in a Divided Society
Ingram 出版How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and pr
-
Unhackable
Ingram 出版Terrified about identity theft and data breaches? Discover a foolproof method to protect your infor
-
Senior Cyber
Ingram 出版As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober h
-
Innovative Security Solutions for Information Technology and Communications
Springer 出版This book constitutes the thoroughly refereed post-conference proceedings of the 13th International
-
Internet of Things
Ingram 出版IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, ove
-
IT-Sicherheit und das Betriebssystem. Unterst羹tzung durch das Betriebssystem und alternative L繹sungsans瓣tze
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,0, FOM Essen, Hoch
-
Machine Learning in Cyber Security
Ingram 出版This book is addressed for both seasoned and beginners in the field of machine learning, we include
-
Full-Stack React, TypeScript, and Node
Packt 出版Discover the current landscape of full-stack development and how to leverage modern web technologie
-
Security, Privacy, and Anonymity in Computation, Communication, and Storage
Springer 出版This book constitutes the refereed proceedings of the 13th International Conference on Security, Pr
-
Constructive Side-Channel Analysis and Secure Design
Springer 出版This book constitutes revised selected papers from the 11th International Workshop on Constructive
-
Introducing Deno
Apress 出版Learn everything there is to know about the new secure runtime for JavaScript: Deno. A proposed rep
-
Practical Jamstack
Apress 出版Learn what JAMstack is all about, what those three big letters in the front mean and why it's so be
-
Threat Modeling
Ingram 出版Threat modeling is one of the most essential--and most misunderstood--parts of the development life
-
Wordpress for Dummies
For Dummies 出版Get to know WordPress with this simple and approachable reference WordPress For Dummies, 9th Edit
-
Internet Password Book
Chartwell 出版Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! Keep tra
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 19th International Conference on Smart Card Research a
-
SSL/TLS Under Lock and Key
Ingram 出版This is the Black and White edition.If you are looking for a comprehensive, soup-to-nuts resource o
-
Signals and Systems
Ingram 出版This book provides clear, interesting, and easy-to-understand coverage of continuous-time and discr
-
D矇veloppement d’Applications Web. Les diff矇rentes langues du web
Ingram 出版Classique de l'ann矇e 2020 dans le domaine Informatique - Internet, Nouvelles Technologies, langue:
-
Security and Privacy in Communication Networks
Springer 出版This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th Inte
-
Ontologies with Python
Apress 出版Use ontologies in Python, with the Owlready2 module developed for ontology-oriented programming. Yo
-
Critical Infrastructure Protection XIV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 14th International Conference on Network and
-
Computer Security
Springer 出版This book constitutes the refereed post-conference proceedings of the 6th International Workshop on
-
Security and Privacy in Communication Networks
Springer 出版This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th Inte
-
Senior Cyber
Ingram 出版As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober h
-
Critical Infrastructure Protection XIII
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
Okta Administration
Packt 出版Plan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how
-
Theory of Cryptography
Springer 出版This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18
-
Pro Ember Data
Apress 出版Learn how to work with Ember Data efficiently, from APIs, adapters, and serializers to polymorphic
-
Azure Networking Cookbook, Second Edition
Packt 出版Learn to leverage virtual machines and load balancers to facilitate secure and efficient networking
-
Advances in Cyber Security
Springer 出版This book presents refereed proceedings of the Second International Conference on Advances in Cyber
-
High Performance Computing
Springer 出版This book constitutes revised selected papers of the 7th Latin American High Performance Computing