-
Information Security: Principles and New Concepts (Volume II)
Ingram 出版This is the era of information. We can read up about everything on the internet. The data is freely
-
Information Security: Principles and New Concepts (Volume IV)
Ingram 出版This is the era of information. We can read up about everything on the internet. The data is freely
-
Artificial Neural Systems Handbook: Volume I
Ingram 出版This book attempts to understand the intricacies of artificial neural systems and how they are rele
-
Supervised Machine Learning for Text Analysis in R
Ingram 出版Text data is important for many domains, from healthcare to marketing to the digital humanities, bu
-
Computer Networking: An Innovative Approach
Ingram 出版The digital communications network which facilitates the sharing of resources between nodes is term
-
Artificial Neural Networks: Advanced Principles
Ingram 出版Artificial neural networks refer to the computing systems inspired by biological neural networks. T
-
Handbook of Computer Networks and Communications: Volume I
Ingram 出版Computer networks and communications are the future of our existence. Even today, they are deeply i
-
Networks and Communications Engineering
Ingram 出版Communications engineering is the study of electrical and computer systems that improve telecommuni
-
Integrated Research in Steganography
Ingram 出版Steganography involves the art of concealing one message or data file within another. Stenographic
-
Handbook of Computer Networks and Communications: Volume II
Ingram 出版Computer networks and communications are the future of our existence. Even today, they are deeply i
-
Information Security: Principles and New Concepts (Volume III)
Ingram 出版This is the era of information. We can read up about everything on the internet. The data is freely
-
Data Security and Cryptography
Ingram 出版Data security is the practice of protecting digital data from unauthorized access and unwanted acti
-
-
-
-
-
-
-
-
-
-
Guia Para Iniciantes Em Hacking de Computadores
Ingram 出版Este livro ensinar獺 como voc礙 pode se proteger dos ataques mais comuns de hackers, sabendo como os
-
The Cybersecurity Self-Help Guide
CRC Press 出版Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are be
-
-
The Ciso's Transformation
Springer 出版The first section of this book addresses the evolution of CISO (chief information security officer)
-
Cybersecurity Issues in Emerging Technologies
Ingram 出版The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing att
-
Partially Homomorphic Encryption
Springer 出版Introduction.- Mathematical Background.- Rivest-Shamir-Adleman Algorithm.- Goldwasser-Micali Algori
-
Datenschutzanalyse, Folgenabsch瓣tzung und Gew瓣hrleistung eines besseren Datenschutzes f羹r definierte Gesch瓣ftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
Ingram 出版Masterarbeit aus dem Jahr 2019 im Fachbereich Informatik - IT-Security, Note: 1,3, Fachhochschule T
-
Blockchain
Ingram 出版Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutioni
-
Computer Security - ESORICS 2021
Springer 出版The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on
-
-
Digital Twin Technology
Ingram 出版Most of the business sectors consider the Digital Twin concept as the next big thing in the industr
-
-
.Net Framework Programmer’s Reference
Ingram 出版This guide provides developers with a complete overview of the .NET architecture. It contains defin
-
Accelerating Angular Development with Ivy
Packt 出版Get a comprehensive introduction to the major Angular framework rewrite known as Angular IvyKey Fea
-
Corporate Cybersecurity
Ingram 出版CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities
-
Networking A to Z
Ingram 出版This volume covers the key concepts and technologies of Local Area Networking in 100 three- to five
-
-
-
-
-
-
-
Principles of Information Security
Ingram 出版The practice of protecting information by eliminating or reducing information risks is termed as in
-
Science of Cyber Security
Springer 出版This book constitutes the proceedings of the Third International Conference on Science of Cyber Sec
-
Information and Software Technologies
Springer 出版This book constitutes the refereed proceedings of the 27th International Conference on Information
-
-
Privilege Escalation Techniques
Packt 出版Enumerate and exploit Linux or Windows systems and escalate your privileges to the highest levelKey