-
-
Digital Forensic Investigation of Internet of Things (IoT) Devices
Springer 出版This book provides a valuable reference for digital forensics practitioners and cyber security expe
-
-
-
Critical Infrastructure Protection XV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
-
Parenting for the Digital Generation
Ingram 出版Provides a practical handbook for parents, grandparents, teachers, and counselors who want to under
-
-
-
-
-
Cybersecurity Leadership Demystified
Packt 出版Gain useful insights into cybersecurity leadership in a modern-day organization with the help of us
-
-
-
-
-
-
-
-
-
Mediated Interfaces
Ingram 出版Images of faces, bodies, selves and digital subjectivities abound on new media platforms like Snapc
-
-
Communication, Networks and Computing
Springer 出版This book constitutes selected and revised papers presented at the Second International Conference
-
Redesigning Wiretapping
Springer 出版This book tells the story of government-sponsored wiretapping in Britain and the United States from
-
-
-
-
Access, Resource Sharing and Collection Development
Routledge 出版This book, first published in 1996, explores the role of libraries in acquiring, storing, and disse
-
-
Phishing and Communication Channels
Apress 出版Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email at
-
Critical Infrastructure Protection XIV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
60 Days to LinkedIn Mastery
Ingram 出版There's only one place in the world where you can find and connect with hundreds of millions of pro
-
Progress in Cryptology - Indocrypt 2021
Springer 出版This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology i
-
-
-
Cryptology and Network Security
Springer 出版This book constitutes the refereed proceedings of the 20th International Conference on Cryptology a
-
Bulletproof TLS and PKI, Second Edition
Ingram 出版Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure server
-
-
-
Security and Trust Management
Springer 出版This book constitutes the proceedings of the 17th International Workshop on Security and Trust Mana
-
Information Systems Security
Springer 出版This book constitutes the proceedings of the 17th International Conference on Information Systems S
-
-
Software Design Patterns for Java Developers
Ingram 出版PracticeDesign Patterns to Enrich and Streamline Software DevelopmentKey FeaturesClassify design pa
-
-
Computational Analysis of Storylines
Ingram 出版Event structures are central in Linguistics and Artificial Intelligence research: people can easily
-
-
-
Spring REST
Apress 出版Design and develop Java-based RESTful APIs using the latest versions of the Spring MVC and Spring B