-
Advanced Computing
Springer 出版This two-volume set constitutes reviewed and selected papers from the 12th International Advanced C
-
Advanced Computing
Springer 出版This two-volume set constitutes reviewed and selected papers from the 12th International Advanced C
-
Progress in Cryptology - Africacrypt 2023
Springer 出版This volume contains the papers accepted for presentation at Africacrypt 2023, the 14th Internation
-
-
Information Systems Security and Privacy
Springer 出版This book includes extended and revised versions of selected papers from the 7th and 8th edition of
-
Deep Machine Learning
Ingram 出版Are you interested in Machine Learning? Are you fascinated by how robots work? Are you ready to ope
-
Ethical Hacking
Ingram 出版Do you know if you were hacked? Do you know if some personal information was stolen from your syste
-
Advances in Digital Forensics XVIII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Data and Applications Security and Privacy XXXVII
Springer 出版This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Confere
-
A Guide to UX Design and Development
Apress 出版Gain a thorough understanding of the two pillars of any User Experience project: the mission and th
-
Computer Safety, Reliability, and Security. Safecomp 2023 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2023, held
-
-
Highlights in Practical Applications of Agents, Multi-Agent Systems, and Cognitive Mimetics. the Paams Collection
Springer 出版This book constitutes the refereed proceedings of the International Workshops on Highlights in Prac
-
Cyber Essentials
Itgp 出版Cyber Essentials - A guide to Cyber Essentials and Cyber Essentials Plus certifications Cyber attac
-
Your Ultimate Guide to Implementing PKI
Ingram 出版Public Key Infrastructure (PKI) has a rich history, spanning back to the 1970s. Despite experiencin
-
Software Product Management
Springer 出版Software Product Management (SPM) is a key success factor for software products and software-intens
-
Reconnaissance for Ethical Hackers
Packt 出版Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and
-
-
-
Computer, Communication, and Signal Processing. Ai, Knowledge Engineering and Iot for Smart Systems
Springer 出版This book constitutes the refereed proceedings of the 7th International Conference on Computer, Com
-
Network and System Security
Springer 出版This book constitutes the refereed proceedings of the 17th International Conference on Network and
-
-
-
Big Data and Social Computing
Springer 出版This book constitutes refereed proceedings of the 8th China National Conference on Big Data and Soc
-
Flask Framework Cookbook - Third Edition
Packt 出版Design and deploy robust state-of-the-art web applications using Flask 2.x and Python 3 frameworks
-
-
-
ChatGPT Prompts
Ingram 出版Unlock the full potential of ChatGPT and revolutionize your interactions!Have you heard about the i
-
Enhancing Deep Learning with Bayesian Inference
Packt 出版Develop Bayesian Deep Learning models to help make your own applications more robust.Key Features:
-
-
Automating and Orchestrating Networks with Netdevops
Cisco Press 出版Master a holistic approach to NetDevOps--from concepts to practical implementation This is your com
-
-
-
-
-
-
-
Software Supply Chain Security
Trillions of lines of code help us in our lives, companies, and organizations. But just a single so
-
Enabling Microservice Success
Ingram 出版Microservices can be a very effective approach for delivering value to your organization and to you
-
-
Technological Innovation for Connected Cyber Physical Spaces
Springer 出版This book constitutes the refereed proceedings of the 14th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Practical Threat Detection Engineering
Packt 出版Go on a journey through the threat detection engineering lifecycle while enriching your skill set a
-
-
-
-
-
-