-
Securing Cyber-Physical Systems
Ingram 出版Think about someone taking control of your car while you're driving. Or, someone hacking into a dro
-
Full Stack Serverless
Ingram 出版Cloud computing is typically associated with backend development and DevOps. But with the rise of s
-
Cyber Breach Response That Actually Works
Wiley 出版You will be breached--the only question is whether you'll be ready A cyber breach could cost your
-
Mastering Windows Security and HardeningSecure and protect your Windows environment from i
Packt 出版Enhance Windows security and protect your systems and servers from various cyber attacksKey Feature
-
Practical User ResearchEverything You Need to Know to Integrate User Research to Your Prod
Apress 出版Explore how User Research has been influenced over the years by a range of disciplines, such as HCI
-
Social Network Analysis
Ingram 出版The book addresses the issue of interdisciplinary understanding of collaboration on the topic of so
-
-
-
-
Geospatial Data Science Techniques and Applications
Ingram 出版The lack of a clear understanding of geoscience science data techniques and related uncertainties c
-
Telegeoinformatics
Ingram 出版This unique book covers the theory, technologies, and applications of telegeoinformatics in some de
-
-
-
Hands-On Natural Language Processing with PyTorch 1.x
Packt 出版Become a proficient NLP data scientist by developing deep learning models for NLP and extract valua
-
-
-
-
-
-
Security Risk Management for the Internet of ThingsTechnologies and Techniques for IoT Sec
Ingram 出版In recent years, the rising complexity of Internet of Things (IoT) systems has increased their pote
-
Mobile Cloud Computing
Ingram 出版Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction
-
Cable and Wireless Networks
Ingram 出版This book presents a comprehensive approach to networking, cable and wireless communications, and n
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 17th International Conference on Detection of Intrusio
-
Transforming Information SecurityOptimizing Five Concurrent Trends to Reduce Resource Drai
Ingram 出版Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty ex
-
Statistical Methods in Computer Security
Ingram 出版Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistica
-
-
-
-
100 Things Every Designer Needs to Know about People
New Riders 出版Apply psychology and behavioral science to web, UX, and graphic design Behavioral science leader an
-
K羹nstliche Intelligenz verstehen. Wie funktionieren die Methoden ”Sensitivity Analysis” (S
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1.0, Fern
-
Virtuele particuliere netwerken in theorie en praktijk
Ingram 出版Dit boek behandelt zowel theoretische als praktische technologie禱n van het virtuele priv矇-netwerk.
-
-
-
Digital DownfallTechnology, Cyberattacks and the End of the American Republic
Ingram 出版Is America on the brink of civil war?Could foreign cyber plots turn Americans against one another a
-
Linux for Hackers
Ingram 出版The book, 'Linux for Hackers: The Advanced Guide on Kali Linux Operating System, ' contains condens
-
Building an Effective Security Program
Ingram 出版Building an Effective Security Program provides readers with a comprehensive approach to securing t
-
Adventures Of Full Stack Software Development
Blurb 出版Master the skills required to become a Full Stack Software Developer. In this book you will learn h
-
API SuccessThe Journey to Digital Transformation
Ingram 出版Authoritative advice on creating and running a successful API program. The number of articles, book
-
Linux for Hackers
Ingram 出版Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a
-
Practical Natural Language ProcessingA Pragmatic Approach to Processing and Analyzing Lang
Ingram 出版Many books and courses tackle natural language processing (NLP) problems with toy use cases and wel
-
-
Ict Systems Security and Privacy Protection34th Ifip Tc 11 International Conference, SEC 2
Springer 出版This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on I
-
The Art of Hacking
Ingram 出版From Sun Tzu to Machiavelli, from Thucydides to Musashi, and more, the teachings of the greatest mi
-
-
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies
Ingram 出版The practical and conceptual knowledge you need to attain CCNP Enterprise certification From one
-
-
Intrusion Detection System for Wireless Sensor Networks
Ingram 出版Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development