-
Internet Searching and Indexing
CRC Press 出版Prevent information overload with better indexing and retrieval strategies!In the fast-changing wor
-
The Art of Attack
Wiley 出版Take on the perspective of an attacker with this insightful new resource for ethical hackers, pente
-
Personalized Privacy Protection in Big Data
Springer 出版This book presents the data privacy protection which has been extensively applied in our current er
-
Security Essentials
This Laboratory Manual complements the Security Essentials textbook and classroom-related studies.
-
Learning Php, MySQL & JavaScript
Ingram 出版Build interactive, data-driven websites with the potent combination of open source technologies and
-
Social Warming
Ingram 出版An impassioned exploration of the ways in which social media has manipulated us all 'Witty, rigorou
-
Security Essentials
Ingram 出版The Security Essentials Study Guide provides users with a valuable means of review and practice ess
-
Contemporary Models of Wireless Communications and Networks
For courses in wireless networking wireless communications, wireless data communications or wireles
-
New Approaches to Improve the Security and QoS in MANET
Mobile Ad-hoc network is a set of wireless devices called wireless nodes, which dynamically connect
-
Adaptive Load Balancing Based Traffic Engineering For VoIP On Network
The original idea is very important for researcher who needs to complete his dissertation or journa
-
Comprehensive Performance Analysis of DW Code Family for SAC-OCDMA
The performance of a realistic optical code-division Multiple-Access OCDMA network have been evalua
-
Analysis of digital portfolios of graphic designers in Ecuador
This research analyzes the digital portfolios of Ecuadorian graphic designers and the possibilities
-
Building a Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classifie
-
Towards Green IoT
This book provides a brief introduction to the history and evolution of the internet. Then, it intr
-
-
Finite-State Text Processing
Weighted finite-state transducers (WFSTs) are commonly used by engineers and computational linguist
-
API Design Patterns
Ingram 出版API Design Patterns lays out a set of design principles for building internal and public-facing API
-
Private Security
Ingram 出版There are few textbooks available that outline the foundation of security principles while reflecti
-
Investigation on improvement of qas issues in wireless networks
This book offers novel ideas for the advancement of fault tolerant adaptive routing algorithms for
-
Designing Secure Software
Ingram 出版What every software professional should know about security. Designing Secure Software consolidates
-
Embracing Risk
This book provides an introduction to the theory and practice of cyber insurance. Insurance as an e
-
Deep Learning
Ingram 出版A richly-illustrated, full-color introduction to deep learning that offers visual and conceptual ex
-
Secure mutual shared key Authentication system using MANETs
Now day's Mobile Networks are rapidly developing by performing e-commerce transactions such as onli
-
Choose Your Infosec Path
Apress 出版Cybersecurity is a pressing issue across industries, as well as increasingly important in people's
-
Screen Time Is Not Forever
Ingram 出版Help young children learn screen-time boundaries and fun ways to spend "screens-off" time. As impo
-
Microsoft Certified Azure Fundamentals Study Guide with Online Labs
Ingram 出版Everything You Need to Succeed on the Azure Fundamentals Exam, Now with 4 Online Lab Modules! If yo
-
Practical Iot Hacking
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to te
-
How Cybersecurity Really Works
Ingram 出版How Cybersecurity Really Works is an engaging introduction to the field of cybersecurity. You'll le
-
Advances in Cryptology - Eurocrypt 2021
Springer 出版The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual Interna
-
Hello Web Design
Ingram 出版This book democratizes web development for everyone. It's a fun, clever guide that covers all of th
-
Task Intelligence for Search and Recommendation
While great strides have been made in the field of search and recommendation, there are still chall
-
Digital Transformers
Ingram 出版Smart devices designed for the Internet of Things (IoT), industrial IoT, and operational technology
-
Iapp Cipp / Us Certified Information Privacy Professional Study Guide
Ingram 出版Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective
-
Computer Networking for Beginners
Do you want to expand your knowledge in the field of computer networking? Do you want to know the f
-
-
Finite-State Text Processing
Weighted finite-state transducers (WFSTs) are commonly used by engineers and computational linguist
-
Sh*t I Can’t Remember
Blurb 出版If you are looking for a great password logbook at a reasonable price, This is the perfect book to
-
The Art of Webassembly
Ingram 出版A a thorough, practice-based introduction to WebAssembly. Learn how to create high-performing, ligh
-
Webassembly: The Definitive Guide
Ingram 出版WebAssembly: The Definitive Guide is a thorough and accessible introduction to one of the most tran
-
Procuring Adhoc Networks from Black Hole Attacks
MANETs are in-secure and vulnerable to attacks as it lacks a central trusted authority. Providing s
-
Computer Network (LAN & WAN) Design and Domain Controller Configurations
Husnifazeel 出版This book consist of sample Computer Network (whole LAN & WAN) design and Primary Child Domain Cont
-
Javascript
Would you like to join today's world and understand the specifics of one of the most popular progra
-
Hacking With Kali Linux
Ingram 出版Are you fascinated by the idea of hacking?Do you want to learn the secrets of ethical hackers?This
-
-
Employment of Transmission Control Protocol over Simulation Tools
This book presents the architecture, fundamentals and analysed the functional structure of Transmis
-
Employment of Transmission Control Protocol over Simulation Platform
This book presents the architecture, fundamentals and analysed the functional structure of Transmis
-
Click fraud
Online search advertising is currently the greatest source of revenue for many Internet giants such
-
Information Security Management of University Libraries
Information systems in university libraries support the delivery of images, scholarly communication