-
High-Speed Large Capacity Optical Fiber Communications
Springer 出版This book systematically explores the synergistic integration of multidimensional modulation and co
-
-
-
-
Securing the Digital Frontier
Ingram 出版Cyber space is easily the most complex thing humans have ever created. With billions of people and
-
-
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Foundations and Practice of Security
Springer 出版This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Fou
-
-
Learning Web Design
O’Reilly Me 出版Do you want to build web pages but have no prior experience? This friendly guide is the perfect pla
-
-
-
-
-
Principle of Architecture, Protocol, and Algorithms for Cog-Min
Springer 出版The Internet is the most important global infrastructure in the digital economy era. Its role has s
-
Advanced Networking Technologies
Advanced networking methods and technologies are emerging as critical components in enabling novel
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Cybersecurity
Springer 出版This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conferenc
-
-
Considerate Content
Lulu.com 出版Rebekah Barry draws on her experience of doing research with people with wide-ranging needs, showin
-
-
-
Reengineering Cyber Security Process
de Gruyter 出版In today's rapidly evolving information technology landscape, cyber-attacks on company assets and I
-
Modern Communication with Social Media
This book explores the evolution of communication, communication media, and covers social media in
-
-
An Essay On The Art Of Decyphering
An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breakin
-
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
-
Natural Language Processing and Information Retrieval
CRC Press 出版This book presents the basics and recent advancements in natural language processing and informatio
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Mastering Network Flow Traffic Analysis
DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, gi
-
JavaScript for Kids
Welcome to the book "JavaScript for Kids: Start your Coding Adventure". This book is your introduct
-
Cyber Security for Next-Generation Computing Technologies
CRC Press 出版This book sheds light on the cybersecurity challenges associated with next generation computing tec
-
-
-
Angular Observables and Promises
Welcome to the book "Angular Observables and Promises: A Practical Guide to Asynchronous Programmin
-
Malware Narratives
Opentask 出版Software Narratology, the science of software stories, found its successful application in software
-
-
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat