-
-
-
IoT Security Paradigms and Applications
Ingram 出版Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numer
-
Cyber Storm
Ingram 出版There's a storm brewing, and your business is right in its path! Despite all of the time and money
-
Privacy by Design for the Internet of Things
Ingram 出版Privacy by design is a proactive approach that promotes privacy and data protection compliance thro
-
-
-
Accelerating DevSecOps on AWS
Packt 出版Build high-performance CI/CD pipelines that are powered by AWS and the most cutting-edge tools and
-
Distributed Computing for Emerging Smart Networks
Springer 出版This book constitutes the refereed proceedings of the Third International Workshop on Distributed C
-
Security and Privacy
Springer 出版This book consists of refereed selected papers from the International Conference on Security & Priv
-
-
Multimedia Forensics
Springer 出版This book is open access. Media forensics has never been more relevant to societal life. Not only m
-
Constructive Side-Channel Analysis and Secure Design
Springer 出版This book constitutes revised selected papers from the 13th International Workshop on Constructive
-
Multimedia Forensics
Springer 出版This book is open access. Media forensics has never been more relevant to societal life. Not only m
-
Building Offline Applications with Angular
Apress 出版Get a complete overview of offline installable applications. Businesses need reliable applications
-
-
-
Selected Areas in Cryptography
Springer 出版This book contains revised selected papers from the 28th International Conference on Selected Areas
-
-
-
-
-
-
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Packt 出版Master key approaches used by real attackers to perform advanced pentesting in tightly secured infr
-
-
Python Text Mining
Ingram 出版Natural Language Processing (NLP) has proven to be useful in a wide range of applications. Because
-
-
Java for Web Development
Ingram 出版Play around JavaBeans, NetBeans IDE, and build strong foundation of web development conceptsKey Fea
-
-
-
-
-
-
-
Auditing Corporate Surveillance Systems
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of b
-
-
Verification and Evaluation of Computer and Communication Systems
Springer 出版This book constitutes the proceedings of the 15th International Conference on Verification an
-
-
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition
Packt 出版Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microso
-
Code-Based Cryptography
Springer 出版This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography,
-
Applications and Techniques in Information Security
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Applications
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 20th International Conference on Smart Card Research a
-
Big Data and Security
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Big Data an
-
Cloud Security Handbook
Packt 出版A comprehensive reference guide to securing the basic building blocks of cloud services, with actua
-
-
AI and Machine Learning for Network and Security Management
Ingram 出版AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Ke
-
-