-
The Dark Cloud
Scribe Us 出版A gripping new investigation into the underbelly of digital technology, which reveals not only how
-
Towards Design and Development of Secure and Privacy-Preserving Frameworks for IOT-enabled Networks
With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is buil
-
The study is titled ”SELF-TEL ARCHITECTURE BASED FAULT IDENTIFICATION AND DELAY AWARE DATA MANAGEMENT FOR IOT MOBILE EDGE ENVIRONMENT
Ingram 出版The Internet of Things (IoT) enables autonomous, predictive, and real-time sensing and monitoring o
-
Improving Lifetime Of WSN Using Bio-Inspired Flower Pollination
The Internet of Things is a evolving network linking the physical world with the cyber world. Every
-
Perception of Cyber Security
This book extends the presentation of overview of the cyber security today, its common perception t
-
In-Band Full-Duplex Radios in 6G Networks
Ingram 出版Sixth-generation (6G) wireless communication networks will transform connected things in 5G into co
-
Java: A Beginner's Guide, Tenth Edition
Ingram 出版A hands-on introduction to Java programming--fully revised for the latest version, Java SE 21Thorou
-
Multicast Authentication Scheme for Energy Conservation
Ingram 出版Conventional methods used in batch signature verification not distinguished between static node sig
-
Concise Encyclopedia of Coding Theory
Ingram 出版Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematic
-
Honeynetcloud Investigation Model for IoT Forensics
Ingram 出版Cyber Forensics, the science of cyber-criminal investigation to detect the nature and type of crime
-
How Social Media Affects Future Teacher’s Well Being
This study aims to delve into the complex relationship between social media and the well-being of f
-
Heuristics for Friendship Selection in Social Internet of Things
Heuristics for friendship selection in the Social Internet of Things (SIoT) refer to the guiding pr
-
LPI Security Essentials Study Guide
Sybex 出版Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Gu
-
Deep Learning
Ingram 出版The book is structured around the following key topics: fundamentals of neural networks, convolutio
-
Applied Cryptography and Network Security
Springer 出版The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st Inter
-
Cross Layer Network Design
Ingram 出版Mobile Ad-hoc networks (MANETs) are the collection of two or more nodes can communicate with each o
-
How I Rob Banks
Wiley 出版Follow FC as he steals from the world's most secure banks and government facilities--without breaki
-
The implementation of security in a LAN/IP network
This work has 107 pages and 5 paragraphs Methods of configuration of cisco equipment, Administrativ
-
Cyber warfare and the need for regulation
Cyber warfare refers to the use of digital technology to carry out attacks against individuals, org
-
Blockchain-based Cheque Processing Framework with Smart Contracts
"Blockchain-based Cheque Processing Framework with Smart Contracts" by Sheetal presents a new appro
-
Practical OPNsense
Ingram 出版Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towar
-
Responsible Responsive Design
Ingram 出版Responsive design has immeasurably improved multi-device, multi-browser visual layout-but it's only
-
Responsive Design Patterns & Principles
Book Apart 出版As responsive design evolves, we have a critical need to think about design challenges beyond mobil
-
Flexible Typesetting
Book Apart 出版For the first time in hundreds of years, because of the web, the role of the typographer has change
-
Design for Safety
Ingram 出版"How will our product hurt people?" As web workers, we don't often ask this question-but we should.
-
Logging Out
Ingram 出版Do you find yourself constantly scrolling through social media, comparing your life to others, and
-
Logging Out
Ingram 出版Do you find yourself constantly scrolling through social media, comparing your life to others, and
-
-
Advanced Networking
Ingram 出版Ad hoc network is a set up anywhere without any need for external infrastructure such as wires of b
-
Packet Classification Method for Preventing Selective Jamming Attacks
Ingram 出版In this book, we address the problem of selective jamming attacks in wireless networks. In these at
-
Efficient Wireless Sensor Network Protocol Using Two Level Clustering
Ingram 出版A wireless sensor network consists of an enormous number of sensor nodes. Every sensor node senses
-
Security of services hosted in the Cloud with Le WAF
Ingram 出版This study focuses on a new approach to outsourcing web application security, which is the distribu
-
Data Structure Lab Guideline
Data Structure is a branch of Computer Science. The study of data structure allows us to understand
-
Networking Fundamentals
Ingram 出版This Lab Manual complements the Networking Fundamentals textbook and classroom-related studies. The
-
Efficient, backoff-based MAC protocols for RCSFs
Ingram 出版Just as in traditional wireless networks, Medium Access Control (MAC) in Wireless Sensor Networks (
-
Least Power Adaptive Hierarchy Cluster for Balancing Energy on WSN
Ingram 出版Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed in a larg
-
-
Optimized TCP Congestion Control Protocol
The objective of the Transmission Control Protocol (TCP) is toprovide reliable end-to-end delivery
-
Securing ChatGPT
"Securing ChatGPT: Best Practices for Protecting Sensitive Data in AI Language Models" is a must-re
-
An Efficient Vertical Handoff Decision Scheme
Ingram 出版The next generation wireless networks are expected to support different applications within a heter
-
Introduction To Cyber Forensics & Investigation
Ingram 出版In the civil and criminal justice systems, computer forensics helps ensure the integrity of digital
-
3D Reconstruction with Deep Learning
3D Reconstruction with Deep Learning" by Rocher is a comprehensive guide to the field of 3D reconst
-
Clear Light
The Singularity is not a union of flesh and machine. Rather, the Singularity is a union of mind to
-
Computer Science for Kids
Wiley 出版A kid-friendly and rigorous new way to teach young readers the fundamentals of computer science In
-
Crypto stego protecting digital secrets
Self Publish 出版Crypto steganography (often simply called "stego") is a technique for concealing secret digital inf
-
Crypto techniques for secure data distribution
Self Publish 出版Cryptographic techniques are essential for secure data distribution, especially when sensitive info
-
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Intechopen 出版In the modern era of digitization, cryptographic techniques are becoming increasingly important. Th
-
Get Rich or Lie Trying
Ingram 出版"Compelling." --Reni Eddo-Lodge, author, Why I'm No Longer Talking to White People About Race Disco