-
API Design
From Monolithic Applications to Microservices, The Evolution of APIs explores the history, principl
-
Stabilization, Safety, and Security of Distributed Systems
Springer 出版This book constitutes the proceedings of the 26th International Symposium on Stabilization, Safety,
-
Future Access Enablers for Ubiquitous and Intelligent Infrastructures
Springer 出版This book constitutes the refereed post-conference proceedings of the 8th EAI International Confere
-
Cybersecurity Tabletop Exercises
The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop ex
-
Secret History
CRC Press 出版Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books p
-
Social Media Strategy
Social Media Strategy: Algorithms That Work for You Social Media Strategy: Algorithms That Work for
-
HTMX Crash Course
Greg Lim 出版In this book, we take you on a fun, hands-on crash course to learning HTMX. You'll start building y
-
Beginning Vue 3 Development
Greg Lim 出版In this book, we take you on a fun, hands-on and pragmatic journey to quickly learn Vue and get fam
-
React Crash Course (Updated to React 19)
Greg Lim 出版Updated to React 19.Developed by Facebook, React is one of the leading frameworks to build efficien
-
-
Modern Cryptography
Security professionals, you know encryption is essential to protect your data. In this book, learn
-
The Language of Cyber Attacks
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with
-
Machine Learning and Intelligent Communication
Springer 出版This book constitutes the refereed post-conference proceedings of the 8th EAI International Confere
-
Black Hat Bash
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining co
-
Navigating Unpredictability: Collaborative Networks in Non-Linear Worlds
Springer 出版This two-volume set, IFIP AICT 726 and 727, constitutes the refereed proceedings of the 25th IFIP W
-
Safer @ Home with pfSense(R)
You no longer need to risk your security and privacy on consumer-grade security products. Book Desc
-
Evasive Malware
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windo
-
-
Cybersecurity in Lifestyle & Hobbies
Wonder Lab 出版Discover the world of cybersecurity with this comprehensive guide that covers everything from perso
-
-
-
Guide to Computer Forensics and Investigations, Loose-Leaf Version
Cengage 出版Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steua
-
-
-
Computational Science and Its Applications - Iccsa 2024 Workshops
Springer 出版This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th
-
The Ethics of Artificial Intelligence
Robot Warz 出版Book Summary: The Ethics of Artificial Intelligence: Can We Trust Our Creations? by Michelle Zhang
-
Computational Science and Its Applications - Iccsa 2024 Workshops
Springer 出版This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th
-
Global Politics Shitshow
Ingram 出版Step right up and welcome to the Circus! In this eye-opening book, the author dives headfirst into
-
Advances in Cryptology - Crypto 2024
Springer 出版The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual Interna
-
Cybersecurity Secrets
A must-read for anyone in the health and wellness industry, highlighting the importance of cybersec
-
Mobile Web and Intelligent Information Systems
Springer 出版This book constitutes the refereed proceedings of the 20th International Conference on Mobile Web a
-
Networks Rising
Ingram 出版For the second time in human history, we are on the verge of broad new breakthroughs in health, pro
-
Cybersecurity Sustainability
Cybersecurity Sustainability: Navigating the Evolving Landscape provides a comprehensive and practi
-
-
-
Computational Science and Its Applications - Iccsa 2024 Workshops
Springer 出版This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th
-
Computational Science and Its Applications - Iccsa 2024 Workshops
Springer 出版This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th
-
Computational Science and Its Applications - Iccsa 2024 Workshops
Springer 出版This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th
-
ICT Systems Security and Privacy Protection
Springer 出版This book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Secu
-
Web 3.0
In Web 3.0: The Future of Decentralized Internet, we delve into the evolution of the Internet and t
-
The Personal Internet Address & Password Logbook
Ingram 出版Tired of losing track of the websites you visit (whether frequently or infrequently), along with al
-
Big Data and Security
Springer 出版The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big
-
Discovered, Not Designed
To build is to be human. Creating things is part of our nature, and our principal mode of survival.
-
The Complete Guide to Defense in Depth
Packt 出版Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilie
-
Websites from A to Z
Icon Books 出版Want information, but don't know where to start? There are millions of Internet Websites of varying
-
Lora Localization
Springer 出版This book delves deep into the world of low-power Internet of Things (IoT) node positioning, in an
-
Dark Web Horrors
Darkside.Exe 出版Are you curious about the dark web and the horrifying activities that take place there?In Dark Web
-
Revolutionary Algorithms
From an artist and TikTok creator, a critical look at the controversial app and its effect on cultu