-
Science of Cyber Security
Springer 出版This book constitutes the proceedings of the 4th International Conference on Science of Cyber Secur
-
The Blockchain Metaverse
Ingram 出版Do you want to know why Internet titans such as Facebook are rebranding as Metaverse platforms? Or
-
Serverless Web Applications with Aws Amplify
Apress 出版Learn the fundamentals of serverless applications and how to take advantage of time-tested Amazon W
-
Post-Quantum Cryptography
Springer 出版This volume constitutes the proceedings of the 13th International Conference on post-quantum crypto
-
Modern Full-Stack Development
Apress 出版Explore what React, Node, Python, Django, TypeScript, Webpack, and Docker have to offer individuall
-
Cyberspace Safety and Security
Springer 出版This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace
-
Geomatics for Green and Digital Transition
Springer 出版This book constitutes the proceedings of the 25th Italian Conference on Geomatics for Green and Dig
-
Applied Cryptography and Network Security Workshops
Springer 出版This book constitutes the proceedings of the satellite workshops held around the 20th International
-
Use of CNNs for the Classification of Medical Images
Ingram 出版Project Report from the year 2021 in the subject Computer Sciences - Artificial Intelligence, grade
-
Building Python Microservices with FastAPI
Packt 出版Discover the secrets of building Python microservices using the FastAPI framework Key Features: -
-
Just React!
Apress 出版Here is your perfect companion for learning about and developing React applications. This book intr
-
Building Web Applications with Vue.Js
Springer 出版Get started with Vue.js quickly and easily with this book This book provides a compact and practica
-
7 Rules To Become Exceptional At Cyber Security
Ingram 出版What every current and aspiring cyber security leader and professional needs to know to become trul
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the proceedings of the 41st International Conference on Computer Safety, Reli
-
-
Maximizing Content Promotion, Podcasting and Advocacy
Ingram 出版The Explained! Pocketbook shows how to build a narrative, how and why to harness the medium of audi
-
Deep Network Design for Medical Image Computing
Ingram 出版Deep Network Design for Medical Image Computing: Principles and Applications covers a range of MIC
-
Electronic Voting
Springer 出版This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on
-
Computer Safety, Reliability, and Security. Safecomp 2022 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2022, whic
-
How to Start a Podcast
Ingram 出版Everything you need to know about how to grow your own podcast today! Have you been struggling to
-
Security and Cryptography for Networks
Springer 出版This book constitutes the proceedings of the 13th International Conference on Security and Cryptogr
-
Hybrid Encryption Algorithms over Wireless Communication Channels
Ingram 出版This book presents novel hybrid encryption algorithms that possess many different characteristics.
-
Engaging with Actor-Network Theory as a Methodology in Medical Education Research
Routledge 出版This book outlines a methodology based on actor-network theory (ANT) and praxiography and applies t
-
Internet of Nano-Things and Wireless Body Area Networks (Wban)
Ingram 出版The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms tha
-
Innovations in Digital Economy
Springer 出版This book constitutes the revised selected papers of the Third International Conference on Innovati
-
Smart Card Security
Ingram 出版This book provides an overview of smart card technology and explores different security attacks and
-
Cross-Site Scripting Attacks
Ingram 出版Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive sour
-
The Cybersecurity Body of Knowledge
Ingram 出版This book explains the content, purpose and use of the eight standard knowledge areas that constitu
-
Research Advances in Intelligent Computing
Ingram 出版This book presents the advances in AI techniques under the umbrella of Intelligent Computing. The b
-
Blockchain Consensus
Apress 出版This book is your comprehensive guide to understanding Blockchain and Blockchain consensus algorith
-
Your Short Guide to Security Systems
Ingram 出版Did you know that a home without a security system is three times more likely to be targeted for a
-
-
Uav Swarm Networks
Ingram 出版UAV swarm network has been used in many critical applications, such as disaster recovery, area surv
-
Cyberpredators and Their Prey
CRC Press 出版Cyberpredators and Their Prey examines cyberpredators from a multidisciplinary perspective utilizin
-
Cyberpredators and Their Prey
CRC Press 出版The online environment has emerged as a continuous and unfettered source of interpersonal criminal
-
Deadly Odds 5.0
In Wyler's 5.0 installment of the Deadly Odds techno-thriller series, Arnold Gold-reformed hacker t
-
Advances in Information and Computer Security
Springer 出版This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSE
-
Practical Cloud Native Security with Falco
Ingram 出版As more and more organizations migrate their applications to the cloud, cloud native computing has
-
Cloud Computing, Big Data & Emerging Topics
Springer 出版This book constitutes the revised selected papers of the 10th International Conference on Cloud Com
-
Digital Blood on Their Hands
Ingram 出版Cyberattacks are nothing particularly new to the world and Ukraine had suffered many such attacks b
-
Digital Blood on Their Hands
Ingram 出版This book addresses the issues that the digital world has created. The culpability, causal links an
-
Advanced Fiber Access Networks
Ingram 出版Advanced Fiber Access Networks takes a holistic view of broadband access networks--from architectur
-
Don’t Trust Your Gut
Dey Street 出版"Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data re
-
Learn Computer Forensics - Second Edition
Packt 出版Learn Computer Forensics from a veteran investigator and technical trainer and explore how to prope
-
Accelerated Windows Malware Analysis with Memory Dumps
Ingram 出版The full transcript of Software Diagnostics Services training. Learn how to navigate process, kerne
-
The Ciso's Next Frontier
Springer 出版This book provides an advanced understanding of cyber threats as well as the risks companies are fa
-
Information Security Technologies for Controlling Pandemics
Springer 出版The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home env
-
Zero Trust Journey Across the Digital Estate
Ingram 出版The book provides an end-to-end view of the Zero Trust approach across organizations' digital estat