-
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition
Packt 出版Implement effective cybersecurity strategies to help you and your security team protect, detect, an
-
Cybersecurity Blue Team Strategies
Packt 出版Build a blue team for efficient cyber threat management in your organizationKey Features: Explore b
-
Mastering Python Networking - Fourth Edition
Packt 出版Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data ana
-
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide
Packt 出版Develop foundational skills in ethical hacking and penetration testing while getting ready to pass
-
Guide to Cybersecurity in Digital Transformation
Springer 出版In today's digital transformation environments, a rigorous cybersecurity approach to effective risk
-
Smart Grid in Iot-Enabled Spaces
Ingram 出版Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among
-
Empirical Studies of Translation and Interpreting
Routledge 出版This edited book is a collection of the latest empirical studies of translation and interpreting (T
-
Information Security and Cryptology
Springer 出版This book constitutes the refereed proceedings of the 18th International Conference on Information
-
Incident Response Techniques for Ransomware Attacks
Packt 出版Explore the world of modern human-operated ransomware attacks, along with covering steps to properl
-
Combating Crime on the Dark Web
Packt 出版Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a de
-
Critical Infrastructure Protection XV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles
Ingram 出版The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mo
-
Identity and Digital Communication
Routledge 出版This comprehensive text explores the relationship between identity, subjectivity and digital commun
-
The Absolute Beginner's Guide to HTML and CSS
Apress 出版Written as an illustrated, step-by-step guide for beginners, this book will introduce you to HTML a
-
Small Business Cybersecurity Planning
Unless you are scaling your business fast, Small Businesses are more susceptible to cybersecurity t
-
Security and Privacy in Communication Networks
Springer 出版This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm
-
Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
Ingram 出版Master's Thesis in the subject Computer Science - IT-Security, language: English, abstract: Big Dat
-
Data Exfiltration Threats and Prevention Techniques
Ingram 出版DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat preven
-
Joomla! 4 Masterclass
Packt 出版Unleash the full potential of the Joomla 4.x series while building powerful, responsive, and state-
-
A Brief Introduction to Web3
Apress 出版Journey into the world of Web3-based application development, its related protocols, and its usage
-
Services Computing - Scc 2022
Springer 出版This volume constitutes the proceedings of the 19th International Conference on Services Computing
-
Web Services - Icws 2022
Springer 出版This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 20
-
Test-Driven Development with PHP 8
Packt 出版A PHP developer's practical guide to planning, writing, and deploying maintainable and extensible s
-
-
Managing Security Services in Heterogenous Networks
Ingram 出版A heterogeneous network is a network which connects computers and other devices with different oper
-
High Performance Computing
Springer 出版This book constitutes the proceedings of the 9th Latin American Conference on High Performance Comp
-
Machine Learning Security Principles
Packt 出版Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obt
-
Emerging Technologies for Authorization and Authentication
Springer 出版This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Tech
-
Closing the Loop
Ingram 出版As design continues to impact our products, services, and solutions at scale, it is more important
-
Data Privacy Management, Cryptocurrencies and Blockchain Technology
Springer 出版This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 In
-
Information Security Applications
Springer 出版This book constitutes the revised selected papers from the 23rd International Conference on Informa
-
Microelectronic Devices, Circuits and Systems
Springer 出版This book constitutes the proceedings of the Third International Conference on Microelectronic Devi
-
Cloud Auditing Best Practices
Packt 出版Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to
-
The Power of Podcasting
Ingram 出版Now two decades old, podcasting is an exuberant medium where new voices can be found every day. As
-
The Power of Podcasting
Ingram 出版Now two decades old, podcasting is an exuberant medium where new voices can be found every day. As
-
Emotions Online
Routledge 出版Digital media have become deeply immersed in our lives, heightening both hopes and fears of their a
-
Data Encryption Standard (DES) and Issues of DES and its Replacement
Ingram 出版Scientific Essay from the year 2022 in the subject Computer Science - IT-Security, grade: 75%, lang
-
Blockchain Technology and Application
Springer 出版This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 202
-
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Wiley 出版APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensi
-
Computer Performance Engineering
Springer 出版This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performanc
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 21st International Conference on Smart Card Research a
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Digital Forensics and Watermarking
Springer 出版This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
Applied Technologies
Springer 出版This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International
-
The Art of Sxo
Apress 出版Search Experience Optimization (SXO) is a fast growing field that combines the disciplines of Searc
-
Microsoft Cybersecurity Architect Exam Ref SC-100
Packt 出版Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day c
-
Information Systems Security
Springer 出版This book constitutes the refereed proceedings of the18th International Conference on Information S