-
Ransomware and Cyber Extortion
Addison-Wesl 出版Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and ot
-
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
Springer 出版This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the
-
-
Advances in Digital Forensics XVII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
-
-
-
Learning Digital Identity
Ingram 出版Why is it difficult for so many companies to get digital identity right? If you're still wrestling
-
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
Springer 出版This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the
-
-
-
-
Software Product Management
Springer 出版Software Product Management (SPM) is a key success factor for software products and software-intens
-
Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Ingram 出版For ensuring a software system's security, it is vital to keep up with changing security precaution
-
-
-
-
Machine Learning for Text
Springer 出版1 An Introduction to Text Analytics.- 2 Text Preparation and Similarity Computation.- 3 Matrix Fact
-
-
Responsive Web Design with HTML5 and CSS - Fourth Edition
Packt 出版Harness the latest capabilities of HTML5 and CSS to create a single UI that works flawlessly on mob
-
Technological Innovation for Applied AI Systems
Springer 出版This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Computer Science - Cacic 2021
Springer 出版This book constitutes revised selected papers from the 27th Argentine Congress on Computer Science,
-
Mind the Tech Gap
Ingram 出版IT and cybersecurity teams have had a long-standing battle between functionality and security. But
-
Pki Implementation and Infrastructures
Ingram 出版The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand
-
Cloud Attack Vectors
Apress 出版Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed
-
-
-
-
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
Democratizing Cryptography
Ingram 出版In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovati
-
Democratizing Cryptography
Ingram 出版In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovati
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th
-
-
5g-Enabled Internet of Things
Ingram 出版How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolut
-
Social Media Income
Ingram 出版Do you think you must have thousands of followers to make money on social media?Some would say so,
-
-
-
-
-
Disinformation in Open Online Media
Springer 出版This book constitutes the refereed proceedings of the 4th Multidisciplinary International Symposium
-
Financial Cryptography and Data Security
Springer 出版This book constitutes revised selected papers from the proceedings of the 26th International Confer
-
-
-
The Blockchain Metaverse
Ingram 出版Do you want to know why Internet titans such as Facebook are rebranding as Metaverse platforms? Or
-
-
Lies of Omission
Ingram 出版A lie of omission--withholding needed information to correct a false belief. There is a sharp and