-
-
-
-
-
Security in Iot
Ingram 出版The diverse applications of IoT are achieved by a set of complex inter-related networks of things a
-
-
The Security Hippie
Ingram 出版The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fraction
-
Real-Time Twilio and Flybase
Apress 出版Use Flybase and Twilio with Node.js to build real-time solutions and understand how real-time web t
-
-
-
Angular Cookbook
Packt 出版Discover actionable solutions to everyday problems in building applications with Angular and TypeSc
-
The Insider Threat
Ingram 出版This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a p
-
Learn Clip Studio Paint - Third Edition
Packt 出版Discover the tools to tell your own manga story with Clip Studio Paint and develop your digital dra
-
-
-
-
Open Source Intelligence and Cyber Crime
Springer 出版This book shows how open source intelligence can be a powerful tool for combating crime by linking
-
-
A Vulnerable System
Ingram 出版As threats to the security of information pervade the fabric of everyday life, A Vulnerable System
-
Mastering Transformers
Packt 出版Take a problem-solving approach to learning all about transformers and get up and running in no tim
-
-
-
-
Instagram Marketing
Ingram 出版INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for
-
-
-
-
Personalized Privacy Protection in Big Data
Springer 出版This book presents the data privacy protection which has been extensively applied in our current er
-
Privacy-Preserving Deep Learning
Springer 出版Introduction.- Definition and Classification.- Background Knowledge.- X-based Hybrid PPDL.- The Gap
-
-
-
-
Attribution of Advanced Persistent Threats
Ingram 出版An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer
-
Applied Cryptography and Network Security Workshops
Springer 出版This book constitutes the proceedings of the satellite workshops held around the 19th International
-
Threat Hunting with Elastic Stack
Packt 出版Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security featur
-
-
Get Good or Get Off
Ingram 出版Social media is a powerful set of tools, that can build your brand, connect you to your customers a
-
-
-
Vlsi-Soc: Design Trends
Springer 出版This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 1
-
Quantum Algorithms for Cryptographically Significant Boolean Functions
Springer 出版1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover's Algorithm and Walsh Spectrum.-
-
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
Packt 出版A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for
-
-
Tracing Attackers with Trust-Based Deterministic Packet Marking
Ingram 出版Computer network attacks are on the increase and are more sophisticated in today's network environm
-
Post-Quantum Cryptography
Springer 出版This volume constitutes the proceedings of the 12th International Conference on post-quantum crypto
-
-
-