-
Amazon Web Services in Action, Third Edition
Master essential best practices for deploying and managing applications on Amazon Web Services. Thi
-
CellCluster
Ingram 出版CellCluster is another alternative to the current techniques of data parallel processing, without i
-
Navigating the Dark Waters of Cybersecurity Incident Response
Ingram 出版Welcome to "Navigating the Dark Waters of Cybersecurity Incident Response," a comprehensive guide t
-
Machine Learning For Humans
Ingram 出版Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems
Ingram 出版With a business baseline focused on the impact of embedded systems in the years ahead, the book inv
-
-
Mitigation of Load Balancing for Cloud Using Ant Colony Optimization
Ingram 出版This book contains the Introduction to Cloud computing, the services provided by the cloud and the
-
The Role of Social Media in IT and ITES Talent Acquisition
Tanvi Singh 出版The chapter aims to provide an introduction to the topic of the research and assessing the signific
-
Cross Platform Application Development
Ingram 出版Cross-platform applications are characterized by being created with a single programming language t
-
Method for handling incidents in telecommunications systems
Currently, computer networks in the corporate environment have systems and equipment essential to t
-
Evading Edr
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the
-
Deconstructing Socio-Political Dynamics
Social media's penetration was visible as most of the youth got attracted to forums like Facebook,
-
Behavior-based Authentication to Protect System Services From Malicious Attacks
Behavior-based authentication is a relatively new approach that has gained traction in recent years
-
A Study on the Social Media Marketing Strategies of Political Parties
Ingram 出版"A Study on the Social Media Marketing Strategies of Political Parties" by Shubham Saxena is a comp
-
Empowering the Next Generation
Ingram 出版A Democratic society is the one, where the citizens elect their representatives and give them the p
-
Concept Map Generation from Domain Text Using Machine Learning and Deep Learning Techniques
The generation of concept maps from domain text using machine learning and deep learning techniques
-
Password Logbook (Hip Floral)
Ingram 出版Keep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a mo
-
Password Logbook (Black & Gold)
Ingram 出版Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed noteb
-
Managing the Buffer Overflow Attack in Network and Operating System Detecting and Preventing Techniques
A thorough manual that addresses buffer overflow assaults is "Managing the Buffer Overflow Attack i
-
Artificial Intelligence-Based Performance Evaluation of Routing in Manet
J. Rangaraj's comprehensive manual "Artificial Intelligence-Based Evaluation of Routing in MANET" a
-
A Proactive Network Surveillance Framework
Network security paradigm should be the one that permeates the enterprise, including people, proces
-
Developing Web Components with Svelte
Apress 出版Leverage the power of Svelte to quickly produce the foundations of a framework-agnostic component l
-
Sentiment and Affect Analysis on Social Media
Srishti 出版Sentiment Analysis is the newest buzzword these days owing to its immense potential to provide real
-
A Framework for Online Geographical Analysis With Geo Tagged Photos and Events on Twitter
Nowadays, social media mining has become a very important part of modern telecommunication systems.
-
Frameworkless Front-End Development
Apress 出版Explore an alternative method of front-end application development without using frameworks or thir
-
Cloud Computing
Ingram 出版Cloud computing is the delivery of different services through the Internet. These resources include
-
Cloud Computing
Ingram 出版Cloud computing is the process of delivering computing services that include storage, database, ser
-
Social Networking Sites, Body Image and Wellbeing
Ingram 出版Social comparison theory (Festinger, 1954) suggests that individuals determine their worth and stat
-
Third Generation Mobile Broadband
Ingram 出版This book focuses on the analyzing of the effectiveness in the use of the third generation (3G) mob
-
-
Person Authentication Based on Dorsal Hand Veins
This book describes a new method for hand vein recognition using biometrics, which is a method of r
-
Social Media for Social Networking and Empowerment of Dalits
Social media are Internet based means which connect the likeminded users. The online social network
-
Role of Social Media in Influencing Consumer Purchase Behavior and Brand Loyalty
Consumer behaviour is comparatively a new field of study, which evolved just after the Second World
-
Social media as learning tool in higher education
As a social being, man is inextricably linked to others in every aspect of life. In this new millen
-
-
Effect of Social Media Usage on Mental Health and Academic Achievement
Ingram 出版There is a growing body of research on the effects of social media usage on mental health and acade
-
Cybersecurity All-In-One for Dummies
For Dummies 出版Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers
-
Changing media ecology and impact of social media on journalism in India
Ingram 出版Ecology is the environment in which medium is used. The word ecology means the study of relationshi
-
Importance of social media in recruitment in Indian IT firms
Ingram 出版Recruitment is considered as a very important activity for any organization, as human capital is a
-
-
Feature Selection Techniques for Classification and Clustering
Ingram 出版There are several feature selection techniques that can be used for classification and clustering,
-
Social media use among students effects on academic performance
Ingram 出版Social Media with its ubiquitous presence has become an almost indispensable part of our lives. Whi
-
Microsoft Azure for Dummies
For Dummies 出版The must-have reference for Azure newcomers As Microsoft's Azure platform takes a larger stake in t
-
Role of social media in creating a new youth
Ingram 出版Social media is social interaction among the people in which they create, share or exchange picture
-
-
The Security & Privacy Acceptance Framework (SPAF)
Ingram 出版Cybersecurity and Privacy (S&P) unlock the full potential of computing. Use of encryption, authenti
-
The Bell Jar
Ingram 出版ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challen
-
E-Voting Through Biometric Security System
Ingram 出版Assistant Professor, Dept: of Electronics and Communication Engineering, College of Engineering Per