-
Security and Privacy in Communication Networks
Springer 出版This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th Inte
-
Ontologies with Python
Apress 出版Use ontologies in Python, with the Owlready2 module developed for ontology-oriented programming. Yo
-
Critical Infrastructure Protection XIV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 14th International Conference on Network and
-
Critical Infrastructure Protection XIII
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
Computer Security
Springer 出版This book constitutes the refereed post-conference proceedings of the 6th International Workshop on
-
Security and Privacy in Communication Networks
Springer 出版This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th Inte
-
-
Okta Administration
Packt 出版Plan, design, and implement identity and access management solutions with Okta Key FeaturesLearn ho
-
Theory of Cryptography
Springer 出版This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18
-
Pro Ember Data
Apress 出版Learn how to work with Ember Data efficiently, from APIs, adapters, and serializers to polymorphic
-
Azure Networking Cookbook, Second Edition
Packt 出版Learn to leverage virtual machines and load balancers to facilitate secure and efficient networking
-
Advances in Cyber Security
Springer 出版This book presents refereed proceedings of the Second International Conference on Advances in Cyber
-
-
Mathematical Theory of Advanced Computing
Ingram 出版This book deals with computer performance by addressing basic preconditions. Besides general consid
-
Authentication and Access Control
Apress 出版Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. A
-
Comment prot矇ger votre entreprise des cybermenaces ?
Ingram 出版Vous 礙tes ? la recherche d'informations sur la cybers矇curit矇 des entreprises? Ne cherchez plus! Le
-
Theory of Cryptography
Springer 出版This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18
-
Hacking with Python and Kali-Linux
Ingram 出版Python is an easy to learn, yet very diverse and powerful programming language and that for the lan
-
Information Security Applications
Springer 出版This book constitutes the thoroughly refereed proceedings of the 21st International Conference on I
-
Theory of Cryptography
Springer 出版This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18
-
Progress in Cryptology - Indocrypt 2020
Springer 出版This book constitutes the refereed proceedings of the 21st International Conference on Cryptology i
-
Building Progressive Web Applications with Vue.Js
Apress 出版Obtain all the necessary tools for developing a progressive web application (PWA) with Vue.js, a mo
-
Information Systems Security
Springer 出版This book constitutes the proceedings of the 16th International Conference on Information Systems S
-
Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, SRH Hochschule Berlin (fr羹
-
Cryptology and Network Security
Springer 出版This book constitutes the refereed proceedings of the 19th International Conference on Cryptology a
-
K羹nstliche Intelligenz (KI) gest羹tzte Prozedurale Synthese
Ingram 出版Studienarbeit aus dem Jahr 2019 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1,3, Fach
-
Electronic Voting
Springer 出版This book constitutes the proceedings of the 5th International Conference on Electronic Voting, E-V
-
WordPress em 10 Dias
Ingram 出版Voc礙 quer aprender a desenvolver temas do WordPress, mas n瓊o sabe programar em PHP? Se voc礙 domina
-
Advances in Cryptology - Asiacrypt 2020
Springer 出版The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th I
-
WordPress in 10 Days
Ingram 出版Would you like to learn how to develop WordPress themes but don't know how to code in PHP? If you a
-
Modern Computer Vision with PyTorch
Packt 出版Get to grips with deep learning techniques for building image processing applications using PyTorch
-
Practical Fairness
Ingram 出版Fairness is becoming a paramount consideration for data scientists. Mounting evidence indicates tha
-
Podcasts SUCK!
Ingram 出版Are you sick and tired of "thinking about" starting a podcast?This book was created for people who
-
Podcast Domination 101
Ingram 出版Do you have the perfect idea for a podcast, but don't know where to start?This book will show you h
-
-
Advances in Cryptology - Asiacrypt 2020
Springer 出版The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th I
-
-
Emerging Technologies for Authorization and Authentication
Springer 出版This book constitutes the proceedings of the Third International Workshop on Emerging Technologies
-
Cybersecurity in Digital Transformation
Springer 出版This book brings together the essential methodologies required to understand the advancement of dig
-
Remote Desktop Protocol. Grundlagen, Sicherheit und RDP-Replay-Attacken
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,3, Hochschule Albs
-
-
SSL/TLS Under Lock and Key
Ingram 出版If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This boo
-
Tor Anonymity Network 101
Ingram 出版Hvis du har s繪gt efter adgang til den mest private og sikre del af internettet, har du fundet den!
-
Interoperability in Iot for Smart Systems
Ingram 出版Interoperability in IoT for Smart Systems discusses the different facets of interoperability issues
-
Crypto Wars
Ingram 出版The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied t
-
-