-
-
-
-
Open Source Intelligence and Cyber Crime
Springer 出版This book shows how open source intelligence can be a powerful tool for combating crime by linking
-
-
A Vulnerable System
Ingram 出版As threats to the security of information pervade the fabric of everyday life, A Vulnerable System
-
Mastering Transformers
Packt 出版Take a problem-solving approach to learning all about transformers and get up and running in no tim
-
-
-
-
Instagram Marketing
Ingram 出版INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for
-
-
-
-
Personalized Privacy Protection in Big Data
Springer 出版This book presents the data privacy protection which has been extensively applied in our current er
-
Privacy-Preserving Deep Learning
Springer 出版Introduction.- Definition and Classification.- Background Knowledge.- X-based Hybrid PPDL.- The Gap
-
-
-
-
Attribution of Advanced Persistent Threats
Ingram 出版An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer
-
Applied Cryptography and Network Security Workshops
Springer 出版This book constitutes the proceedings of the satellite workshops held around the 19th International
-
Threat Hunting with Elastic Stack
Packt 出版Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security featur
-
-
Get Good or Get Off
Ingram 出版Social media is a powerful set of tools, that can build your brand, connect you to your customers a
-
-
-
Vlsi-Soc: Design Trends
Springer 出版This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 1
-
Quantum Algorithms for Cryptographically Significant Boolean Functions
Springer 出版1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover's Algorithm and Walsh Spectrum.-
-
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
Packt 出版A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for
-
-
Tracing Attackers with Trust-Based Deterministic Packet Marking
Ingram 出版Computer network attacks are on the increase and are more sophisticated in today's network environm
-
Post-Quantum Cryptography
Springer 出版This volume constitutes the proceedings of the 12th International Conference on post-quantum crypto
-
-
-
-
-
-
-
-
-
-
-
-
Social Media Marketing
Ingram 出版SOCIAL MEDIA MARKETINGToday, platforms like Facebook, Twitter, and Instagram are making it amazingl
-
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 18th International Conference on Detection of Intrusio
-
Not Just Chatting
Ingram 出版"Bravo! Who would have thought such a vast variety of ways to be entertained, educated, soothed, an
-
Rapid Application Development with AWS Amplify
Packt 出版Get to grips with the AWS Amplify framework and use it to build scalable cloud-native progressive w