-
-
-
-
Characterization, Avoidance and Repair of Packet Collisions in Inter-Vehicle Communication Networks
Ingram 出版This work proposes a combined and accurate simulation of wireless channel, physical layer and netwo
-
Ranking for Web Data Search Using On-The-Fly Data Integration
Ingram 出版Ranking - the algorithmic decision on how relevant an information artifact is for a given informati
-
Information Security and Cryptology - Icisc 2021
Springer 出版This book constitutes selected papers from the 24th International Conference on Information Securit
-
The Online World, What You Think You Know and What You Don't
Ingram 出版Every Child Who Has Access to a Smartphone, Tablet, Computer, or Video Games is at Risk!But NOW You
-
Advancing Computational Intelligence Techniques for Security Systems Design
Ingram 出版Security systems have become an integral part of the building and large complex setups, and interve
-
Secure and Efficient IP Mobility Support for Aeronautical Communications
Ingram 出版Motivated by the future Internet Protocol (IP) based aeronautical telecommunications network suppor
-
-
-
-
-
-
-
-
Personalized Privacy Protection in Big Data
Springer 出版This book presents the data privacy protection which has been extensively applied in our current er
-
Security as Code
Ingram 出版DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cl
-
Once More Unto the Breach
Ingram 出版The challenges you face as an information security manager (ISM) have increased enormously since th
-
A Concise Introduction to the NIS Directive
Ingram 出版This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network an
-
Selling Information Security to the Board
Ingram 出版Information technology plays a fundamental role in the operations of any modern business. While the
-
Information Security a Practical Guide
Ingram 出版How do you engage with your peers when they think you're there to stop them working? Corporate info
-
Governance and Internal Controls for Cutting Edge It
To remain competitive we rely on being early adopters of new technologies - but there are inherent
-
The Art of Cyber Security
Ingram 出版This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber securi
-
Assessing Information Security
Ingram 出版The activities of the cyber criminal are both deliberate and hostile, and they can be compared to m
-
-
-
-
-
-
-
-
Entropy Randomization in Machine Learning
Ingram 出版Entropy Randomization in Machine Learning presents a new approach to machine learning-entropy rando
-
-
Socio-Technical Aspects in Security
Springer 出版This book constitutes revised selected papers from the refereed conference proceedings of the 11th
-
Theoretical Cybersecurity
Apress 出版There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to sa
-
Data and Applications Security and Privacy XXXVI
Springer 出版This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data a
-
-
-
Ansible: Up and Running
Ingram 出版Among the many configuration management tools available, Ansible has some distinct advantages: It's
-
-
-
Good Listen
Ingram 出版Axiom Business Book Awards Bronze Medal Winner in Networking The Secrets Behind Creating Compelling
-
-
Podcasting - The Companion Handbook
Ingram 出版Podcasting-The Companion Handbook: A Guide to Producing and Publishing Your Podcast is a reference
-
Advances in Digital Forensics XVIII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Quantum Communication, Quantum Networks, and Quantum Sensing
Ingram 出版Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introducti
-
Data Analytics for Cybersecurity
Ingram 出版As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats.