-
-
-
Information, Communication and Computing Technology
Springer 出版This book constitutes proceedings of the 7th International Conference on Information, Communication
-
-
-
Responsible Graph Neural Networks
Ingram 出版More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-s
-
Information Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the 27th Australasian Conference on Information S
-
Information Security
Springer 出版This book constitutes the proceedings of the 25th International Conference on Information Security,
-
Applications and Usability of Interactive TV
Springer 出版This book constitutes thoroughly refereed and revised selected papers from the 10th Iberoamerican C
-
Theory of Cryptography
Springer 出版The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of
-
Theory of Cryptography
Springer 出版The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of
-
Network and Parallel Computing
Springer 出版This book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network
-
Blockchain, Artificial Intelligence, and the Internet of Things
Springer 出版This book provides basic concepts and deep knowledge about various security mechanisms that can be
-
-
-
-
-
Frontiers in Cyber Security
Springer 出版This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in
-
-
-
-
-
CompTIA Network] N10-008 Certification Guide - Second Edition
Packt 出版Become a network specialist by developing your skills in network implementation, operations and sec
-
-
-
-
-
The Personal Cybersecurity Manual
Ingram 出版Cybercriminals can ruin your life-this book teaches you to stop them before they can.Cybercrime is
-
Statistical Methods for Annotation Analysis
Springer 出版Labelling data is one of the most fundamental activities in science, and has underpinned practice,
-
A Beginner’s Guide to Internet of Things Security
Ingram 出版A Beginner's Guide to Internet of Things Security focuses on security issues and developments in th
-
-
-
-
-
-
-
-
-
-
Network Protocols for Security Professionals
Packt 出版Get to grips with network-based attacks and learn to defend your organization's network and network
-
Cyber-Security Threats and Response Models in Nuclear Power Plants
Springer 出版This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed b
-
-
A European Perspective on Crisis Informatics
Ingram 出版Mobilising helpers in the event of a flood or letting friends know that you are okay in the event o
-
Information Security Practice and Experience
Springer 出版This book constitutes the refereed proceedings of the 17th International Conference on Information
-
-
-
-