-
-
5G Multimedia Communication
Ingram 出版In bringing to the readers the book 5G Multimedia Communication: Technology, Multiservices and Depl
-
-
Wireless Hacking With Kali Linux
Ingram 出版Do you like working using a wireless network since you can carry your computer and work with you ev
-
-
-
-
-
-
React Projects - Second Edition
Packt 出版Learn how to develop real-world applications of varying complexity for the web, mobile, and VR devi
-
Privacy Preservation in Iot: Machine Learning Approaches
Springer 出版This book aims to sort out the clear logic of the development of machine learning-driven privacy pr
-
-
-
-
-
-
-
-
-
XML Programming
Apress 出版XML Web services are the fundamental building blocks in the move to distributed computing on the In
-
Fireworks MX 2004 Zero to Hero
Apress 出版Macromedia's Fireworks MX 2004 enables you to design, optimize, and add basic interactivity to your
-
-
-
-
-
Mobile App Reverse Engineering
Packt 出版Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobil
-
-
Security Issues for Wireless Sensor Networks
Ingram 出版Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wirel
-
Future Network Architectures and Core Technologies
Ingram 出版This book introduces the background, basic concepts and evolution of computer network development;
-
-
-
Kafka Streams in Action, Second Edition
Ingram 出版Everything you need to implement stream processing on Apache Kafka using Kafka Streams and the kqsI
-
-
Security and Artificial Intelligence
Springer 出版AI has become an emerging technology to assess security and privacy, with many challenges and poten
-
-
-
Electronic Governance and Open Society: Challenges in Eurasia
Springer 出版This book constitutes the refereed proceedings of the 8th Conference on Electronic Governance and O
-
Hacking Artificial Intelligence
Ingram 出版The ability to hack AI and the technology industry's lack of effort to secure it is thought by expe
-
-
-
Security, Privacy and Data Analytics
Springer 出版This book constitutes refereed proceedings of the International Conference on Security, Privacy and
-
-
-
-
-
-
-