-
-
-
-
-
-
-
-
-
Guia Para Iniciantes Em Hacking de Computadores
Ingram 出版Este livro ensinar獺 como voc礙 pode se proteger dos ataques mais comuns de hackers, sabendo como os
-
The Cybersecurity Self-Help Guide
CRC Press 出版Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are be
-
-
The Ciso's Transformation
Springer 出版The first section of this book addresses the evolution of CISO (chief information security officer)
-
Cybersecurity Issues in Emerging Technologies
Ingram 出版The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing att
-
Partially Homomorphic Encryption
Springer 出版Introduction.- Mathematical Background.- Rivest-Shamir-Adleman Algorithm.- Goldwasser-Micali Algori
-
Datenschutzanalyse, Folgenabsch瓣tzung und Gew瓣hrleistung eines besseren Datenschutzes f羹r definierte Gesch瓣ftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
Ingram 出版Masterarbeit aus dem Jahr 2019 im Fachbereich Informatik - IT-Security, Note: 1,3, Fachhochschule T
-
Blockchain
Ingram 出版Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutioni
-
Computer Security - ESORICS 2021
Springer 出版The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on
-
-
Digital Twin Technology
Ingram 出版Most of the business sectors consider the Digital Twin concept as the next big thing in the industr
-
-
.Net Framework Programmer’s Reference
Ingram 出版This guide provides developers with a complete overview of the .NET architecture. It contains defin
-
Accelerating Angular Development with Ivy
Packt 出版Get a comprehensive introduction to the major Angular framework rewrite known as Angular IvyKey Fea
-
Corporate Cybersecurity
Ingram 出版CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities
-
Networking A to Z
Ingram 出版This volume covers the key concepts and technologies of Local Area Networking in 100 three- to five
-
-
-
-
-
-
-
Principles of Information Security
Ingram 出版The practice of protecting information by eliminating or reducing information risks is termed as in
-
Science of Cyber Security
Springer 出版This book constitutes the proceedings of the Third International Conference on Science of Cyber Sec
-
Information and Software Technologies
Springer 出版This book constitutes the refereed proceedings of the 27th International Conference on Information
-
-
Privilege Escalation Techniques
Packt 出版Enumerate and exploit Linux or Windows systems and escalate your privileges to the highest levelKey
-
-
Snowflake Security
Apress 出版This book is your complete guide to Snowflake security, covering account security, authentication,
-
-
-
Practical Svelte
Apress 出版Learn to leverage the power of Svelte to produce web applications that are efficient and fast. This
-
-
Computer Security - ESORICS 2021
Springer 出版The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on
-
Facehooked
Ingram 出版The number of Facebook users worldwide exceeded one billion in August of 2012. With the increase in
-
-
-
-
Progress in Cryptology - LATINCRYPT 2021
Springer 出版This book constitutes the proceedings of the 7th International Conference on Cryptology and Informa
-