-
-
-
Blockchain Technology and Application
Springer 出版This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 202
-
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Wiley 出版APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensi
-
Computer Performance Engineering
Springer 出版This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performanc
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 21st International Conference on Smart Card Research a
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Digital Forensics and Watermarking
Springer 出版This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
-
Microsoft Cybersecurity Architect Exam Ref SC-100
Packt 出版Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day c
-
Information Systems Security
Springer 出版This book constitutes the refereed proceedings of the18th International Conference on Information S
-
-
-
-
-
High Performance with Laravel Octane
Packt 出版Explore tools, techniques, and practices to remove performance bottlenecks and enhance the stabilit
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Network and
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! In this book you wil
-
-
-
-
Supercharging Node.js Applications with Sequelize
Packt 出版A hands-on implementation guide to application development in Node.js using the powerful Sequelize
-
Applied Intelligence and Informatics
Springer 出版This book constitutes the refereed proceedings of the Second International Conference on Applied In
-
Network Automation with Go
Packt 出版Understand the world of modern network automation with Go and deepen your knowledge with insights f
-
Cloud Identity Patterns and Strategies
Packt 出版Get to grips with identity patterns and design a structured enterprise identity model for cloud app
-
-
-
PCI Compliance
Ingram 出版The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is conti
-
Silicon Valley Cybersecurity Conference
Springer 出版This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cy
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Mathematical Modeling and Supercomputer Technologies
Springer 出版This book constitutes selected and revised papers from the 22nd International Conference on Mathema
-
Network Programming with Linux
Ingram 出版To construct today's distributed, network applications and services, you really want profound domin
-
The Magic Visual
Lulu.com 出版Making images will help you get noticed in any medium. The Magic Visual will teach you the how and
-
Secret Admirer
Ingram 出版This book will explain the origins and details of the 'parasocial relationship.'
-
Advancements in Interdisciplinary Research
Springer 出版This volume constitutes selected and revised papers presented at the First International Conference
-
High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on High-Perform
-
An Ethical Guide to Cyber Anonymity
Packt 出版Dive into privacy, security, and online anonymity to safeguard your identityKey Features: Leverage
-
Practical Highcharts with Angular
Apress 出版Learn to create stunning animated and interactive charts using Highcharts and Angular. This updated
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
-
-
Data Duped
Ingram 出版We are commonly deceived by numbers and data in our everyday lives. From lotteries, product warrant
-
Digital Forensics and Incident Response - Third Edition
Packt 出版Build your organization's cyber defense system by effectively applying digital forensics, incident
-
Modern Frontend Development with Node.js
Packt 出版Enhance your web development projects by fully leveraging Node.js concepts, tools, and best practic
-
An Event-Driven Parallel-Processing Subsystem for Energy-Efficient Mobile Medical Instrumentation
Ingram 出版Aging population and the thereby ever-rising cost of health services call for novel and innovative