-
A Hacker, I Am
Ingram 出版A Hacker, I Am is not your normal cyber security book, it explains topics in stories, scenarios, wi
-
Machine Learning For Beginners
Ingram 出版Machine learning is going to be something that you are going to use so that you can discover why an
-
Computer Security and Encryption
Ingram 出版Because of the rapid growth of cybercrime, cryptography and system security may be the fastest grow
-
Smart Office. Auswirkung der Digitalisierung auf Geb瓣ude und Ausstattung
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - Internet, neue Technologien, Note: 1,0,
-
Beginning Java MVC 1.0
Apress 出版Get started with using the new Java MVC 1.0 framework for model, view, and controller development f
-
SQL Injection Strategies
Packt 出版Learn to exploit vulnerable database applications using SQL injection tools and techniques, while u
-
-
Podcast PlannerDaily Plan Your Podcasts Episodes Goals & Notes, Podcasting Journal, Keep T
Ingram 出版This beautiful Podcast Planner is a perfect way to keep your podcast episodes organized. This will
-
Financial Cryptography and Data Security
Springer 出版This book constitutes the thoroughly refereed post-conference proceedings of the 24th International
-
Security and Data Reliability in Cooperative Wireless Networks
Ingram 出版Following a detailed overview of cooperative communications and the physical layer security, this b
-
Device-To-Device Based Proximity Service
Ingram 出版D2D-based proximity service is a very hot topic with great commercial potential from an application
-
Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures and ApplicationsConcepts, Architectures and Applications
Ingram 出版This comprehensive book unveils the working relationship of blockchain and the fog/edge computing.
-
Spectrum Sharing in Wireless Networks
Ingram 出版Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview
-
Internet of Things (Iot)
Ingram 出版The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the pot
-
Mobile Evolution
Ingram 出版This book presents insights, interpretations, concepts, and interdependent views--in the landscape
-
Energy-Efficient Wireless Sensor Networks
Ingram 出版The advances in low-power electronic devices integrated with wireless communication capabilities ar
-
Smart Things and Femtocells
Ingram 出版This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (
-
Location Privacy in Wireless Sensor Networks
Ingram 出版Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecede
-
Introduction to Certificateless Cryptography
Ingram 出版As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead o
-
Security and Privacy in Internet of Things (Iots)
Ingram 出版The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortu
-
Mathematical Foundations of Public Key Cryptography
Ingram 出版In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more t
-
Handbook of Internet Computing
Ingram 出版Scientists in different geographical locations conduct real-time experiments in a virtual shared wo
-
Intrusion Detection and Prevention for Mobile Ecosystems
Ingram 出版This book presents state-of-the-art contributions from both scientists and practitioners working in
-
Integrated Networking, Caching, and Computing
Ingram 出版This book features the major research advances on integrated networking, caching, and computing. In
-
Cybersecurity
Routledge 出版A cogent overview of the threat spectrum of cyberspace attacks and cyber weapons, this book introdu
-
Securing Cyber-Physical Systems
Ingram 出版Think about someone taking control of your car while you're driving. Or, someone hacking into a dro
-
Full Stack Serverless
Ingram 出版Cloud computing is typically associated with backend development and DevOps. But with the rise of s
-
Cyber Breach Response That Actually Works
Wiley 出版You will be breached--the only question is whether you'll be ready A cyber breach could cost your
-
Mastering Windows Security and HardeningSecure and protect your Windows environment from i
Packt 出版Enhance Windows security and protect your systems and servers from various cyber attacksKey Feature
-
11 Simple Steps to Being a Podcast SensationHow to create, launch and run a professional p
Ingram 出版If you've always fancied having your own podcast but don't know how to go about setting one up let
-
The Content Marketing Playbook - Strategies to Attract the Right Customers
Ingram 出版Are you interested in learning how content marketing can improve your business and profits? Tired o
-
Node.js Web Development - Fifth Edition
Packt 出版Build scalable web applications using Node.js, Express.js, and the latest ECMAScript techniques, al
-
Internet Infrastructure
Ingram 出版Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive int
-
Vehicular Social Networks
Ingram 出版The book provides a comprehensive guide to vehicular social networks. The book focuses on a new cla
-
Mobile Ad Hoc Networks
Ingram 出版In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) te
-
Computer Network Simulation Using Ns2
Ingram 出版Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge
-
The Motor City Woman Planner for New PodcastersTheMotor City Woman Planner for New Podcasters
Ingram 出版This is the all-time favorite tool for new podcasters! Learn how to organize your podcast and maxim
-
AI Self-Driving Cars DivulgementPractical Advances In Artificial Intelligence And Machine Learning
Ingram 出版A vital book by industry thought leader and global AI expert, Dr. Lance Eliot, and based on his pop
-
Vlsi-Soc: New Technology Enabler
Springer 出版This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 1
-
Transforming Information SecurityOptimizing Five Concurrent Trends to Reduce Resource Drai
Ingram 出版Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty ex
-
Statistical Methods in Computer Security
Ingram 出版Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistica
-
Social Network Analysis
Ingram 出版The book addresses the issue of interdisciplinary understanding of collaboration on the topic of so
-
Geospatial Data Science Techniques and Applications
Ingram 出版Data science has recently gained much attention for a number of reasons, and among them is Big Data
-
Mobile Cloud Computing
Ingram 出版Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction
-
Cable and Wireless Networks
Ingram 出版Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, c
-
Telegeoinformatics
Ingram 出版This book explains the fundamentals and intricacies of telegeoinformatics. The book is divided into
-
Security Risk Management for the Internet of ThingsTechnologies and Techniques for IoT Sec
Ingram 出版In recent years, the rising complexity of Internet of Things (IoT) systems has increased their pote
-
Hands-On Natural Language Processing with PyTorch 1.x
Packt 出版Become a proficient NLP data scientist by developing deep learning models for NLP and extract valua