-
The Dark Web
The Dark Web: Inside the Digital Underworld provides a comprehensive exploration of the secretive a
-
Social Media Mastery
Yo Dude 出版Discover the secrets to going viral and achieving social media mastery with Social Media Mastery: H
-
Django in Action
Build professional quality web applications using Python and the Django 5.0 web framework. The Djan
-
SAP Cloud Alm
SAP Press 出版Optimize your ALM practices with SAP Cloud ALM! Get started by deploying SAP Cloud ALM, defining yo
-
-
The Reign of Botnets
Wiley 出版A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Bo
-
Sentiment Analysis on Customer Reviews of E-commerce Site
Sentiment Analysis invokes the study of text analysis, natural language processing, and computation
-
Industrial Networks and Intelligent Systems
Springer 出版This book constitutes the refereed proceedings of the 10th EAI International Conference on INISCOM
-
The Audience Is Listening
Ingram 出版"How do I get more listeners?"You are a podcaster. And if you were a beast on a David Attenborough
-
Exploring Data Mining Core Concepts and Methods
"Exploring Data Mining: Core Concepts and Methods" is a comprehensive guide that delves into the fu
-
Networking the Future
The field of data communication networks is evolving rapidly, driven by advancements in technology
-
”Fortifying the Future
The rapid advancement of blockchain technology has revolutionized various industries, promising enh
-
”Digital Highways
"Digital Highways" is crafted to be both informative and accessible, offering a blend of theoretica
-
”Windows Unveiled
"Windows Unveiled: Revolutionizing Operating Systems" delves into the multifaceted journey of Micro
-
Interconnected Realm
In today's rapidly evolving digital landscape, communication networks stand as the cornerstone of o
-
Distributed Computer and Communication Networks
Springer 出版The proceedings constitute papers presented in the 26th International Conference, DCCN 2023, held i
-
Alice and Bob Learn Secure Coding
Wiley 出版Unlock the power of secure coding with this straightforward and approachable guide! Discover a game
-
Advances in Artificial Intelligence
Springer 出版This book constitutes the refereed proceedings of the 20th Conference of the Spanish Association fo
-
”Network Nexus
"Networking Essentials" offers a comprehensive exploration of modern networking technologies, provi
-
Disruptive Networking
The references provided cover a wide range of topics in modern computing and networking, including
-
Bridging the Digital Gap
"Bridging the Digital Gap: Exploring the Role of Artificial Intelligence, Machine Learning, and Cyb
-
Cybersecurity and Information Assurance
Cybersecurity and Information Assurance is a comprehensive book that explores the world of cybersec
-
Ubiquitous Networking
Springer 出版This book constitutes the refereed proceedings of the 9th International Symposium on Ubiquitous Net
-
Red Team, Blue Team (Hardcover Edition)
"Red Team, Blue Team: A White Hacking Reference" is a comprehensive guide that takes readers on a j
-
AI Ethics and Fairness
Get ready to dive deep into the ethical complexities of AI with AI Ethics and Fairness by Edward Fr
-
The Code of Honor
Wiley 出版A comprehensive and practical framework for ethical practices in contemporary cybersecurity While s
-
Hacking for the Technically Challenged
Get ready for a wild ride with "Hacking for the Technically Challenged: A Noob's Guide" by Black Ha
-
Data Migration for SAP
SAP Press 出版Whether you're moving to the cloud, migrating to SAP S/4HANA, or replacing a legacy system, get the
-
Internet of Things - New Insights
Intechopen 出版Embark on a journey through the dynamic world of the Internet of Things (IoT) with Internet of Thin
-
Computational Semantics
Intechopen 出版This book analyzes the application of computer science and artificial intelligence (AI) techniques
-
Brain hacking without fanaticism
The work is devoted to the study of the issue of Internet technologies of the XXI century, as well
-
Instagram and the construction of identity among Argentine teenagers
This qualitative research work had a design based on grounded theory, non-experimental, cross-secti
-
Full-Duplex Radio in High-Efficiency WLANs
The Full-Duplex radio transmission technique is a prominent feature in the physical layer of the ne
-
Secured Routing Approach
A advanced Routing algorithm for Wireless sensor network, this approach is efficient method for WSN
-
Security Yearbook 2024
Wiley 出版A fascinating history of the cybersecurity industry as well as an up-to-date collection of leading
-
The Cybersecurity Guide to Governance, Risk, and Compliance
Wiley 出版The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generat
-
Exam Ref Az-500 Microsoft Azure Security Technologies
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure secu
-
Multi-User Access in High-Efficiency WLANs
To promote the MU (Multi-User) communications in High-Efficiency WLANs, the new IEEE 802.11ax stand
-
Npr's Podcast Start Up Guide
Ingram 出版From NPR comes the definitive guide to podcasting--featuring step-by-step advice on how to find a u
-
Understanding Cryptography
Springer 出版Understanding and employing cryptography has become central for securing virtually any digital appl
-
Foundations of IoT in Healthcare
The integration of Internet of Things (IoT) technology in healthcare has led to transformative chan
-
Introduction to IoT, Blockchain, and Healthcare
The convergence of Internet of Things (IoT) and Blockchain technologies has paved the way for trans
-
Pulsed Neural Networks
Ingram 出版Most practical applications of artificial neural networks are based on a computational model involv
-
-
The Dark Side of Networking
Ingram 出版Master the art of network security with this comprehensive guide. Dive deep into understanding netw
-
Cloud computing service adoption & supply chain performance
This research book empirically investigated the influence of cloud computing service adoption on su
-
Blockchain in Healthcare
Blockchain technology has emerged as a promising solution for addressing data security and interope
-
New Age Master Data Management in Synergy with Big Data Analytics
In this digital transformation era, data is growing exponentially due to substantial online transac