-
Social Media’s Impact on Politics
Ever more voters are changing their voting decisions from one election to the next. With increasing
-
From Likes To Luxury Influencer Strategies
In the always advancing universe of online entertainment, powerhouses have become something other t
-
Social Media Success From Zero To Influencer
Web-based Entertainment Achievement: From Zero to Force to be reckoned with" is a dynamic and canny
-
Online News Influencers Mold Public Sentiment
In the speedy scene of the advanced age, online news powerhouses have arisen as strong problem solv
-
Digital Frontlines The Privacy Battle
In an undeniably interconnected and computerized world, our own information has become both an impo
-
The Evolving Media Landscape Narratives Of Tomorrow
"The Developing Media Scene: Stories of Tomorrow" is an interesting investigation of the powerful u
-
Podcasts Voices Echoing In Digital Airwaves
Man-made reasoning (computer based intelligence) is reforming the media business by introducing ano
-
Revolutionizing LTE-A
Wireless networks are often taken for granted in the modern, interconnected world where instantaneo
-
Unveiling YouTube Secrets Create, Monetize, Elevate Channel
"Revealing YouTube Privileged insights: Make, Adapt, Lift Your Channel" is an extensive aide that t
-
The Android Malware Handbook
Written by machine-learning researchers and members of the Android Security team, this all-star gui
-
Get Rich or Lie Trying
"Compelling." --Reni Eddo-Lodge, author, Why I'm No Longer Talking to White People About Race Disco
-
High Performance, Low Energy, and Trustworthy Blockchains Using Satellites
Blockchains are meant to provide an append-only sequence (ledger) of transactions. Security commonl
-
Risks and Threats in Cloud Computing
This paper consists of a brief risk analysis of the cloud computing model, based on research conduc
-
Math for Security
Use applied math to map fire stations, develop facial recognition software, solve the art gallery p
-
Euro-Par 2023: Parallel Processing Workshops
Springer 出版This book constitutes revised selected papers from the workshops held at the 29th International Con
-
Hack to the Future
Wiley 出版Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack t
-
Introduction to Cybersecurity
Springer 出版This book provides an introduction to the basic ideas involved in cybersecurity, whose principal ai
-
Global Voices Media In Connected World
In an era defined by unprecedented global interconnectedness, "Global Voices Media in a Connected W
-
Networked Minds Shape Social Media’s Impact
"Networked Minds Shape Social Media's Impact" explores how the collective behaviors and interaction
-
Social Media Ethics Rules & Responsibility
Social media ethics involve a set of principles, rules, and responsibilities that guide individuals
-
Social Media Mastery for Beginners Unleashing the Power of Marketing
Self 出版Understanding the Basics of Social MediaIn today's digital age, social media has become an integral
-
Digital Era Reshapes Media Industry
Digital Era Reshapes Media IndustryThe advent of the digital era has heralded a profound transforma
-
Ethical Hacking: Techniques, Tools, and Countermeasures + Cloud Labs
Print Textbook & Cloud Lab Access: 180-day subscription.The cybersecurity Cloud Labs for Ethical Ha
-
Social Media Empowers Global Advocates
In today's interconnected world, social media has emerged as a powerful catalyst for change, enabli
-
Social Media and Campus Politics
This complete assortment of expositions investigates the diverse parts of our quickly developing wo
-
Blockchain and Trustworthy Systems
Springer 出版The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings o
-
Creating Selective Overmatch
The 2022 National Defense Strategy calls for "integrated deterrence" in how the U.S. military uses
-
Attribute-Based Encryption (Abe)
Ingram 出版Attribute-based Encryption (ABE) Enables readers to understand applications of attribute-based encr
-
Build a Frontend Web Framework (from Scratch)
Learn how a frontend web framework works by coding your own! Web developers use frontend frameworks
-
Social Media Impact on Consumer Behavior & Brand Loyalty
The book " Social Media Impact on Consumer Behavior & Brand Loyalty " by Ravi Gupta delves into the
-
Advanced SEO Techniques
Are you ready to unlock the power of SEO and propel your website to the top of Google's search resu
-
The Social Hacking Dictionary
Ingram 出版Unveil the realm of social manipulation in "The Social Hacking Dictionary" by Black Hat Kathy. This
-
Building a Joint Cyber Weapons Acquisition Program in the Marine Corps
The authors present lessons learned and observations from an effort to help inform future U.S. Mari
-
Wireless Sensor Networks and the Internet of Things
Ingram 出版Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a
-
Anticipating Flashpoints with Russia
The authors sought to identify possible Russian flashpoints in Europe that could entangle the Unite
-
Streamlit for Data Science - Second Edition
Packt 出版An easy-to-follow and comprehensive guide to creating data apps with Streamlit, including how-to gu
-
Asp in a Nutshell
Oreilly & 出版ASP in a Nutshell provides the high-quality reference documentation that web application developers
-
Raspberry Pi
Mike Hoffman 出版The Raspberry Pi is a revolutionary and compact single-board computer that has sparked a global mak
-
Beyond Keywords The Modern Guide To Effective SEO
Modern Publi 出版"Beyond Keywords: The Modern Guide to Effective SEO" is a comprehensive and up-to-date resource tha
-
Security protocols for wireless sensor networks
Ingram 出版Technological advances in recent years have led to the development of a new generation of computer
-
Effective Vulnerability Management
Wiley 出版Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best pr
-
The Dark Web
The Most Up to Date Book on Dark Web & Dark Net.You must read this book if you want to learn about
-
The Rise of Chatgpt
Ingram 出版In this thought-provoking book, the author explores the rapidly evolving field of artificial intell
-
Decentralized Finance
Financial markets are undergoing an unprecedented transformation. Technological advances have broug
-
Design and Development of Efficient Routing Protocols in Mobile Ad-Hoc Networks
Wired Networks or Cellular Networks are unsuccessful in compromised physical areas or environments
-
Terrorism and the Social Media
Ingram 出版"TERRORISM AND THE SOCIAL MEDIA" Your Definitive Guide to Understanding the Complex Relationship Be
-
Applications and Usability of Interactive TV
Springer 出版This book constitutes the refereed proceedings of the 11th Iberoamerican Conference on Applications
-
Web Development from Beginner to Paid Professional, 2
I know there are more than sufficient resources online to teach absolute beginners everything they