-
-
Trusted Computing Platforms
Springer 出版Trusted Computing Platforms: Design and Applications is written for security architects, applicatio
-
Cyber Operations
Wiley 出版Cyber Operations A rigorous new framework for understanding the world of the future Information t
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Progress in Cryptology - Indocrypt 2022
Springer 出版The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYP
-
Java Memory Management
Packt 出版Improve application performance by tuning, monitoring and profiling both the garbage collector and
-
Full Stack Quarkus and React
Packt 出版Create and deploy standalone, fully functional, web applications using Quarkus and React Key Featur
-
Marketing Thee Podcast 101
Lulu.com 出版You have a great podcast, purpose and concept good; that's what I like. Now, it's time to tell the
-
Color Accessibility Workflows
Ingram 出版Color is a powerful tool that affords seemingly endless design possibilities, but we often design w
-
The Wires of War
Ingram 出版From the former news policy lead at Google, an "informative and often harrowing wake-up call" (Publ
-
Making Sense of Color Management
Book Apart 出版Get clarity in the tricky endeavor of managing colors from initial design to final product. Learn w
-
-
Information, Communication and Computing Technology
Springer 出版This book constitutes proceedings of the 7th International Conference on Information, Communication
-
-
-
Responsible Graph Neural Networks
Ingram 出版More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-s
-
Information Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the 27th Australasian Conference on Information S
-
Information Security
Springer 出版This book constitutes the proceedings of the 25th International Conference on Information Security,
-
Applications and Usability of Interactive TV
Springer 出版This book constitutes thoroughly refereed and revised selected papers from the 10th Iberoamerican C
-
Theory of Cryptography
Springer 出版The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of
-
Theory of Cryptography
Springer 出版The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of
-
Network and Parallel Computing
Springer 出版This book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network
-
Blockchain, Artificial Intelligence, and the Internet of Things
Springer 出版This book provides basic concepts and deep knowledge about various security mechanisms that can be
-
Secure It Systems
Springer 出版This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems,
-
Advanced PHP Strings
Lulu.com 出版Working with multibyte strings, Unicode, and UTF-8 can feel intimidating when writing PHP. Advanced
-
Security Architecture - How & Why
Ingram 出版Security Architecture, or Enterprise Information security architecture, as it was originally coined
-
Computer Security - Esorics 2022
Springer 出版The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symp
-
Frontiers in Cyber Security
Springer 出版This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in
-
-
-
Ccks 2022 - Evaluation Track
Springer 出版This book constitutes the refereed proceedings of the 7th China Conference on Knowledge Graph and S
-
Cryptography and Network Security
Ingram 出版Starting with the historical facts behind the concept of information, which led to the creation of
-
CompTIA Network] N10-008 Certification Guide - Second Edition
Packt 出版Become a network specialist by developing your skills in network implementation, operations and sec
-
-
Drones in Iot-Enabled Spaces
Ingram 出版This book addresses major issues and challenges in drone-based solutions proposed for IoT-enabled c
-
-
Technological and Business Fundamentals for Mobile App Development
Springer 出版This book is an essential introductory guide to the knowledge required to develop apps. Chapter by
-
The Personal Cybersecurity Manual
Ingram 出版Cybercriminals can ruin your life-this book teaches you to stop them before they can.Cybercrime is
-
Statistical Methods for Annotation Analysis
Springer 出版Labelling data is one of the most fundamental activities in science, and has underpinned practice,
-
A Beginner’s Guide to Internet of Things Security
Ingram 出版A Beginner's Guide to Internet of Things Security focuses on security issues and developments in th
-
Task Intelligence for Search and Recommendation
Springer 出版While great strides have been made in the field of search and recommendation, there are still chall
-
-
Diving into Secure Access Service Edge
Packt 出版Implement Secure Access Service Edge (SASE) for secure network and application communications, expl
-
Advances in Cryptology - CRYPTO 2022
Springer 出版This book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conferen
-
Cryptography for Payment Professionals
Ingram 出版Although cryptography plays an essential part in most modern solutions, especially in payments, cry