-
Security Assurance by Efficient Password Based Authentication
Ingram 出版At present, identity theft is one of the most prevalent security threats.Authentication is an inevi
-
Mastering Apache Solr
Ingram 出版Topic: In the open source, full-text search community, a leader emerges - Apache Solr. Apache Solr
-
Improving the Security and Privacy of Edge Devices Through Blockchain
Ingram 出版The world of IoT existence is wholly being built on the communication and the interconnectionof thi
-
-
Advances in Cyber Security and Intelligent Analytics
Ingram 出版We live in a digital world, where we use digital tools and smart devices to communicate over the In
-
Computer Security. Esorics 2022 International Workshops
Springer 出版This book constitutes the refereed proceedings of seven International Workshops which were held in
-
Logged Off
Ingram 出版WELCOME TO THE SECOND EDITION!How many likes did you receive on your last post?Are you satisfied wi
-
Detection of Opinion Spam in Online Social Media
Ingram 出版With the rise of social media, people started sharing opinions or experiences, exchanging ideas, pr
-
Proofs, Arguments, and Zero-Knowledge
Ingram 出版This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called inte
-
Wireless Penetration Testing
Ingram 出版Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES &
-
Pricing Design
Ingram 出版Pricing projects can feel tricky, but it doesn't have to be. Dan Mall explains how to earn more, by
-
Cultivating Content Design
Ingram 出版Great content doesn't happen in a vacuum. It gets bogged down in teams, organizations, silos, and p
-
Practical Pair Programming
Ingram 出版Two heads are better than one, especially when it comes to large, mission-critical software project
-
Blockchains
Springer 出版This book takes readers through the sensational history of blockchains and their potential to revol
-
Wordpress in Easy Steps
This popular guide toWordPress shows you how to create websites without having to learn coding, and
-
Get Ready for CSS Grid Layout
Ingram 出版By the time CSS Grid Layout was supported by all major browsers in 2017, Rachel Andrew had already
-
Medical Image Security
Ingram 出版At the present time, surviving without access to the digital information media using various types
-
Internet of things (IoT) Security
Ingram 出版Internet of security in IoT is the act of securing Internet devices and the networks they're connec
-
The control of the archives
Ingram 出版Mastery of archives: a necessity for the effective and efficient management of Single Window for Bu
-
A Novel Approach for Personalized Bigdata Security System
Ingram 出版In this technological advanced and digitalization era, there are many number of organizationsfacing
-
Lightweight Secure Network Coding for Security and Privacy of Smart Sensor Objects
Ingram 出版Network coding existed for a very long time. It provides efficient techniques to enhance the effici
-
Instagram for Dummies
For Dummies 出版Are you on Insta? Start sharing pictures and a lot, lot more Instagram For Dummies helps you naviga
-
Comprehensive Hypertext Markup Language (HTML).
Blurb 出版This course is intended for aspiring web designers and developers who need to comprehend HTML thoro
-
Image Performance
Book Apart 出版To solve the most critical performance problems with the biggest impact, start with images. Respons
-
How does AI impact the organizational identity in client-focused investment advisory?
Ingram 出版Seminar paper from the year 2021 in the subject Computer Sciences - Artificial Intelligence, grade:
-
Practical Cyber Threat Intelligence
Knowing your threat actors together with your weaknesses and the technology will master your defens
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
Ingram 出版This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling
-
Study of Internet Use and Its Related Variables Among Teenagers
The Internet plays a crucial role in the day-to-day lives of the current generation, making things
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests
Ingram 出版The only official CCSP practice test product endorsed by (ISC)2 With over 850 practice questions al
-
Blockchain and Trustworthy Systems
Springer 出版This book constitutes the thoroughly refereed post conference papers of the 4th International Confe
-
Self-Publish with Me
Ingram 出版No matter what type of writer you are or genre of book you write, books flying off bookstore shelve
-
Techniques for Secure Transmission
Crypto has a long and exciting history. most do not complete technical description of Kahn of the m
-
-
-
MCA Microsoft Certified Associate Azure Network Engineer Study Guide
Ingram 出版Prepare to take the NEW Exam AZ-700 with confidence and launch your career as an Azure Network Engi
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide
Ingram 出版The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP
-
The Cloud in Iot-Enabled Spaces
Ingram 出版The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions propos
-
-
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, th
-
Learning Salesforce Development with Apex
Ingram 出版Learn to harness the power of the Apex language to build Salesforce applications DESCRIPTIONAcquiri
-
Modern Cybersecurity Strategies for Enterprises
Ingram 出版Security is a shared responsibility, and we must all own it KEY FEATURES ● Expert-led instruc
-
Data for All
Gain in-depth knowledge about how companies manipulate and exploit personal data. A book that does
-
Secure Multi-Party Computation Against Passive Adversaries
Springer 出版This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also
-
-
Safety and Security of Cyber-Physical Systems
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with e
-
Blockchain Security from the Bottom Up
Wiley 出版The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the