-
Cybersecurity and Secure Information SystemsChallenges and Solutions in Smart Environments
Springer 出版Security and Privacy in Smart City Applications and Services: Opportunities and Challenges; A. Verm
-
Security and Privacy Trends in the Industrial Internet of Things
Springer 出版This book, written by leaders in the protection field of critical infrastructures, provides an exte
-
Internet Technology
Ingram 出版This book contains a simple description of how modern networks and the Internet and are structured
-
-
Natural Language Processing with Spark Nlp
Ingram 出版If you want to build an enterprise-quality application that uses natural language text but aren璽 t
-
-
The React Workshop
Packt 出版Work through engaging exercises and activities and gain practical skills to make your web applicati
-
-
-
-
DIY Website Workbook
Ingram 出版You know your business needs a website but don't quite know where to start. Should you make it your
-
Articulating Design DecisionsCommunicate with Stakeholders, Keep Your Sanity, and Deliver
Ingram 出版Talking to people about your designs might seem like a basic skill, but it can be difficult to do w
-
Network and CommunicationResearch on the Development of Electronic Information Engineering
Springer 出版Table of Contents List of Expert Groups and Writing Groups Introduction I. Global Development T
-
Social Media Marketing For Beginners - How To Make Money Online
Ingram 出版Looking For Guaranteed Strategies To Dominate & Monetize Your Social Media Brand? Are you someone w
-
A Hacker, I Am
Ingram 出版A Hacker, I Am is not your normal cyber security book, it explains topics in stories, scenarios, wi
-
-
Computer Security and Encryption
Ingram 出版Because of the rapid growth of cybercrime, cryptography and system security may be the fastest grow
-
Smart Office. Auswirkung der Digitalisierung auf Geb瓣ude und Ausstattung
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - Internet, neue Technologien, Note: 1,0,
-
Beginning Java MVC 1.0
Apress 出版Get started with using the new Java MVC 1.0 framework for model, view, and controller development f
-
SQL Injection Strategies
Packt 出版Learn to exploit vulnerable database applications using SQL injection tools and techniques, while u
-
-
Podcast PlannerDaily Plan Your Podcasts Episodes Goals & Notes, Podcasting Journal, Keep T
Ingram 出版This beautiful Podcast Planner is a perfect way to keep your podcast episodes organized. This will
-
Financial Cryptography and Data Security
Springer 出版This book constitutes the thoroughly refereed post-conference proceedings of the 24th International
-
Security and Data Reliability in Cooperative Wireless Networks
Ingram 出版Following a detailed overview of cooperative communications and the physical layer security, this b
-
Device-To-Device Based Proximity Service
Ingram 出版D2D-based proximity service is a very hot topic with great commercial potential from an application
-
Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures and ApplicationsConcepts, Architectures and Applications
Ingram 出版This comprehensive book unveils the working relationship of blockchain and the fog/edge computing.
-
Spectrum Sharing in Wireless Networks
Ingram 出版Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview
-
Internet of Things (Iot)
Ingram 出版The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the pot
-
Mobile Evolution
Ingram 出版This book presents insights, interpretations, concepts, and interdependent views--in the landscape
-
Energy-Efficient Wireless Sensor Networks
Ingram 出版The advances in low-power electronic devices integrated with wireless communication capabilities ar
-
Smart Things and Femtocells
Ingram 出版This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (
-
Location Privacy in Wireless Sensor Networks
Ingram 出版Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecede
-
Introduction to Certificateless Cryptography
Ingram 出版As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead o
-
Security and Privacy in Internet of Things (Iots)
Ingram 出版The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortu
-
Mathematical Foundations of Public Key Cryptography
Ingram 出版In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more t
-
Handbook of Internet Computing
Ingram 出版Scientists in different geographical locations conduct real-time experiments in a virtual shared wo
-
Intrusion Detection and Prevention for Mobile Ecosystems
Ingram 出版This book presents state-of-the-art contributions from both scientists and practitioners working in
-
Integrated Networking, Caching, and Computing
Ingram 出版This book features the major research advances on integrated networking, caching, and computing. In
-
Cybersecurity
Routledge 出版A cogent overview of the threat spectrum of cyberspace attacks and cyber weapons, this book introdu
-
Securing Cyber-Physical Systems
Ingram 出版Think about someone taking control of your car while you're driving. Or, someone hacking into a dro
-
Full Stack Serverless
Ingram 出版Cloud computing is typically associated with backend development and DevOps. But with the rise of s
-
Cyber Breach Response That Actually Works
Wiley 出版You will be breached--the only question is whether you'll be ready A cyber breach could cost your
-
Mastering Windows Security and HardeningSecure and protect your Windows environment from i
Packt 出版Enhance Windows security and protect your systems and servers from various cyber attacksKey Feature
-
Practical User ResearchEverything You Need to Know to Integrate User Research to Your Prod
Apress 出版Explore how User Research has been influenced over the years by a range of disciplines, such as HCI
-
Social Network Analysis
Ingram 出版The book addresses the issue of interdisciplinary understanding of collaboration on the topic of so
-
-
-