-
-
Entropy Randomization in Machine Learning
Ingram 出版Entropy Randomization in Machine Learning presents a new approach to machine learning-entropy rando
-
-
Socio-Technical Aspects in Security
Springer 出版This book constitutes revised selected papers from the refereed conference proceedings of the 11th
-
Theoretical Cybersecurity
Apress 出版There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to sa
-
Data and Applications Security and Privacy XXXVI
Springer 出版This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data a
-
-
-
Ansible: Up and Running
Ingram 出版Among the many configuration management tools available, Ansible has some distinct advantages: It's
-
-
-
Good Listen
Ingram 出版Axiom Business Book Awards Bronze Medal Winner in Networking The Secrets Behind Creating Compelling
-
-
Podcasting - The Companion Handbook
Ingram 出版Podcasting-The Companion Handbook: A Guide to Producing and Publishing Your Podcast is a reference
-
Advances in Digital Forensics XVIII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
-
Data Analytics for Cybersecurity
Ingram 出版As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats.
-
-
-
The Social Pro Code
Ingram 出版Do you like the idea of Social Media Management but don't know how exactly to get started? Or have
-
Learn Wireshark - Second Edition
Packt 出版Expertly analyze common protocols such as TCP, IP, and ICMP, along with learning how to use display
-
-
Security in Computer and Information Sciences
Springer 出版This open access book constitutes the thoroughly refereed proceedings of the Second International S
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 19th International Conference on Detection of Intrusio
-
-
-
Anomaly Detection as a Service
Springer 出版Anomaly detection has been a long-standing security approach with versatile applications, ranging f
-
-
-
-
-
-
-
-
Applied Cryptography and Network Security
Springer 出版The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied C
-
Cyber Crime Investigator’s Field Guide
Ingram 出版Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence C
-
-
-
Advances in Cybersecurity Management
Springer 出版This book concentrates on a wide range of advances related to IT cybersecurity management. The topi
-
Controlling Privacy and the Use of Data Assets - Volume 1
Ingram 出版"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companie
-
Evidence-Based Cybersecurity
Ingram 出版The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a
-
Applied Technologies
Springer 出版This volume constitutes the refereed proceedings of the Third International Conference on Applied T
-
-
-
Designing APIs with Swagger and Openapi
Ingram 出版Follow real-world API projects from concept to production, and learn hands-on how to describe and d
-
Euro-Par 2021: Parallel Processing Workshops
Springer 出版This book constitutes revised selected papers from the workshops held at the 27th International Con
-
Modeling and Control of AC Machine Using Matlab(r)/Simulink
Ingram 出版This book introduces electrical machine modeling and control for electrical engineering and science
-