-
Cyber Security Education
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
-
-
-
-
-
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Cyber Forensics and Digital Security
In today's hyperconnected world, where digital transformation accelerates at an unprecedented pace,
-
Practical Cloud Security Handbook
As organizations rapidly migrate to cloud environments, robust cloud security is no longer optional
-
The Collaborative Coder
The digital revolution has redefined the boundaries of software development, transforming it into a
-
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Establishing Security Operations Center
Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Artificial Intelligence in Image Processing
Artificial Intelligence in Image Processing: Concepts, Techniques, and Applications provides a comp
-
Certified Ethical Hacker (Ceh) Study Guide
The CEH exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing ex
-
-
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping in
-
-
-
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully review
-
-
The vCISO Playbook
The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Bu
-
-
You Have a New Memory
NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural critici
-
Artificial Intelligence Paradigms for Application Practice
CRC Press 出版This book proposes practical application paradigms for deep neural networks, aiming to establish be
-
-
Wireless Sensor Network Security
Ingram 出版Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies
-
The Language of Machines
Ingram 出版This book offers a clear, accessible guide to the inner workings and real-world impact of large lan
-
Computer Network LAB
Networking refers to the practice of connecting computers and other devices to share resources, exc
-
Energy and Throughput Optimization in NB-IoT Networks
This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and