-
Social Networking Marketing Opportunities and Challenges
Ingram 出版Explores the potential benefits and obstacles associated with using social networking platforms as
-
Automating Quality Assessment of Social Media Content
Ingram 出版Provides insights into cutting-edge techniques developed to evaluate the quality of context-specifi
-
Online Social Networking Sites Impact
Ingram 出版Online Social Networking Sites delves into the realm of online social networking platforms, seeking
-
Internet Addiction and Its Effect on Children
Ingram 出版In today's digital age, where internet access is widespread and readily available, understanding th
-
The Peep & Squeak Easy-to-Read Password Assistance Book (with tabs)
Ingram 出版Let Peep & Squeak help you find those hard to remember things ... we all have to keep so much in ou
-
Preserving Medical Big Data Security with Soft Computing
Ingram 出版This focuses on the security and privacy preservation of medical big data using soft computing tech
-
End-to-End Security for LTE Machine Type Communication
Ingram 出版The "End-to-End Security Scheme for Machine Type Communication (MTC) in LTE Network" presents a com
-
Essentials of Cloud Computing
Springer 出版Numerous advancements are being brought in and incorporated into the cloud domain with the aim of r
-
-
-
Machine Learning For Humans (6 x 9)
Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
-
Discovering Internet
The words you provided shed light on a truth we all know deep down-the ever-increasing importance a
-
-
-
-
-
-
-
-
-
Building in Security at Agile Speed
Ingram 出版Today's high-speed and rapidly changing development environments demand equally high-speed security
-
-
Jeff Duntemann’s Drive-By Wi-Fi Guide
Provides everything Wi-Fi users need to know to design, build, protect, and extend a Wi-Fi wireless
-
Dreamweaver 4 F/X and Design
Dreamweaver? 4 f/x and Design improves, enriches, and builds upon the reader's current Dreamweaver
-
ASP.NET 2.0 Black Book
The ASP.Net 2.0 Black Book features immediate solutions that provide hands-on real-world techniques
-
Cisco Network Security Little Black Book
With this concise, problem-solving guide you will learn how to identify network security threats an
-
-
-
SAP Access Control
Ingram 出版Manage on-premise user access with this comprehensive guide to SAP Access Control. Begin with step-
-
-
Securing the Internet of Things Environment against RPL Attacks
Self Publish 出版Kevin Ashton first coined the term Internet of Things in his presentation on automating the supplyc
-
-
-
Professional Security Management
Routledge 出版Historically, security managers have tended to be sourced from either the armed forces or law enfor
-
-
-
-
-
The study is titled ”SELF-TEL ARCHITECTURE BASED FAULT IDENTIFICATION AND DELAY AWARE DATA MANAGEMENT FOR IOT MOBILE EDGE ENVIRONMENT
Ingram 出版The Internet of Things (IoT) enables autonomous, predictive, and real-time sensing and monitoring o
-
-
Perception of Cyber Security
This book extends the presentation of overview of the cyber security today, its common perception t
-
-
-
-
Concise Encyclopedia of Coding Theory
Ingram 出版Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematic
-
-