-
-
-
Information Security and Privacy
Springer 出版This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, h
-
-
-
-
Bug Bounty from Scratch
Packt 出版Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital lan
-
-
-
-
-
The Index of Coincidence
Ingram 出版The beautifully clear Introduction, in its entirety: The subject of this pamphlet is coincidence."C
-
Reactive Patterns with RxJS and Angular Signals - Second Edition
Packt 出版Leverage the reactive paradigm with RxJS and signals in your Angular applications using common patt
-
Spring Security - Fourth Edition
Packt 出版Leverage the power of Spring Security 6 to protect your modern Java applications from hackersKey Fe
-
-
Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer 出版This book constitutes the refereed post-conference proceedings of the 19th EAI International Confer
-
Data and Applications Security and Privacy XXXVIII
Springer 出版This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applica
-
Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer 出版This book constitutes the refereed post-conference proceedings of the 19th EAI International Confer
-
Security and Privacy in Communication Networks
Springer 出版This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th Internat
-
-
-
Automating Security Detection Engineering
Packt 出版Accelerate security detection development with AI-enabled technical solutions using threat-informed
-
High-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection
Ingram 出版High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents st
-
Mastering Open Source Threat Analysis Strategies
Ingram 出版The book is designed for a practical approach to learning, with examples based on scenarios. It cov
-
Cost Savvy Secure Cloud
Ingram 出版In "Cost Savvy Secure Cloud," author Preity Gupta challenges the misconception that security is sol
-
Practical Backscatter Communication for the Internet of Things
Springer 出版This book is devoted to offering a comprehensive and detailed discussion of the design of high-reli
-
-
-
-
Mastering PyTorch - Second Edition
Packt 出版Master advanced techniques and algorithms for machine learning with PyTorch using real-world exampl
-
Mastering Transformers - Second Edition
Packt 出版Explore transformer-based language models from BERT to GPT, delving into NLP and computer vision ta
-
-
-
Designing Real-World Multi-Domain Networks
Cisco Press 出版The comprehensive guide to design integration in a multi-domain environment providing consistent de
-
Efficient Online Incentive Mechanism Designs for Wireless Communications
Springer 出版This book initially delves into its fundamentals to initiate the exploration of online incentive me
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 21st International Conference on Detection of Intrusio
-
Big Data and Security
Springer 出版The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big
-
-
Responsive Web Development
Ingram 出版Bridging web and mobile for next-gen user experiencesDESCRIPTION The book explores how modern web a
-
Adaptive Neuro-Fuzzy Inference System as a Universal Estimator
Ingram 出版This book presents some recent specialized works of a theoretical study in the domain of adaptive n
-
-
-
Mastering Gemini Artificial Intelligence Prompting for Google Workspace
Ingram 出版Explore the transformative capabilities of Gemini AI within Google Workspace in this essential guid
-
-
-
Learning Devsecops
Ingram 出版How can organizations integrate security while continuously deploying new features? How can some ma
-
Mastering Gemini Artificial Intelligence Prompting for Google Workspace
Ingram 出版Explore the transformative capabilities of Gemini AI within Google Workspace in this essential guid
-