-
Podcasting - The Companion Handbook
Ingram 出版Podcasting-The Companion Handbook: A Guide to Producing and Publishing Your Podcast is a reference
-
Advances in Digital Forensics XVIII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Quantum Communication, Quantum Networks, and Quantum Sensing
Ingram 出版Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introducti
-
Data Analytics for Cybersecurity
Ingram 出版As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats.
-
Security Risk Models for Cyber Insurance
Ingram 出版Cyber attacks are rapidly increasing in sophistication and magnitude. The last few years having see
-
-
The Social Pro Code
Ingram 出版Do you like the idea of Social Media Management but don't know how exactly to get started? Or have
-
Hack the Cybersecurity Interview
Packt 出版Get your dream job and set off on the right path to achieving success in the cybersecurity field wi
-
Learn Wireshark - Second Edition
Packt 出版Expertly analyze common protocols such as TCP, IP, and ICMP, along with learning how to use display
-
Security in Computer and Information Sciences
Springer 出版This open access book constitutes the thoroughly refereed proceedings of the Second International S
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 19th International Conference on Detection of Intrusio
-
Becoming an Enterprise Django Developer
Packt 出版A Python web developer's guide to exploring the Django development lifecycle - beyond the basics Ke
-
Rust Web Development with Rocket
Packt 出版Explore the world of Rocket-fueled web application development and the power of the Rust programmin
-
Anomaly Detection as a Service
Springer 出版Anomaly detection has been a long-standing security approach with versatile applications, ranging f
-
The Web Accessibility Project
Ingram 出版Approximately 15% of the global population is affected by some sort of disability, according to the
-
-
Security Awareness Design in the New Normal Age
Ingram 出版This book will primarily consider the problem of hitting that 'Sweet Spot' in the age of 'New Norma
-
Urban Analytics with Social Media Data
Ingram 出版The use of data science and urban analytics has become a defining feature of smart cities. This tim
-
Cyber-Physical Security and Privacy in the Electric Smart Grid
Springer 出版This book focuses on the combined cyber and physical security issues in advanced electric smart gri
-
-
Psychological Insights on the Role and Impact of the Media During the Pandemic
Routledge 出版This volume examines the role played by media and communications systems in informing and influenci
-
Applied Cryptography and Network Security
Springer 出版The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied C
-
Cyber Crime Investigator’s Field Guide
Ingram 出版Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence C
-
-
Foundations and Practice of Security
Springer 出版This book constitutes the revised selected papers of the 14th International Symposium on Foundation
-
Advances in Cybersecurity Management
Springer 出版This book concentrates on a wide range of advances related to IT cybersecurity management. The topi
-
Controlling Privacy and the Use of Data Assets - Volume 1
Ingram 出版"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companie
-
Evidence-Based Cybersecurity
Ingram 出版The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a
-
Applied Technologies
Springer 出版This volume constitutes the refereed proceedings of the Third International Conference on Applied T
-
Controlling Privacy and the Use of Data Assets - Volume 1
Ingram 出版This book uses practical lessons learned in applying real-life concepts and tools to help security
-
Cybersecurity in Intelligent Networking Systems
Ingram 出版CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this import
-
Designing APIs with Swagger and Openapi
Ingram 出版Follow real-world API projects from concept to production, and learn hands-on how to describe and d
-
Euro-Par 2021: Parallel Processing Workshops
Springer 出版This book constitutes revised selected papers from the workshops held at the 27th International Con
-
Modeling and Control of AC Machine Using Matlab(r)/Simulink
Ingram 出版This book introduces electrical machine modeling and control for electrical engineering and science
-
-
Cybercrime
Ingram 出版WINNER: Independent Press Awards 2023 - Category: Computer Cybercrime is a sad, ever-developing r
-
Transformers for Machine Learning
CRC Press 出版Transformers are becoming a core part of many neural network architectures, employed in a wide rang
-
Technological Innovation for Digitalization and Virtualization
Springer 出版This book constitutes the refereed proceedings of the 13th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
-
Creator's Guide to Snap Inc.'s Lens Studio
Turner 出版Get started using Lens Studio and make your own custom lenses for Snapchat! This quick and easy res
-
Modern CSS with Tailwind
Pragmatic 出版This new edition of the book covers Tailwind 3.0, which changes the way Tailwind generates its CSS.
-
Days of Pandemic
Ingram 出版Description This book covers a variety of topics that are of interest now. It features personal poe
-
-
Quantum Key Distribution Networks
Springer 出版Fundamentals of Quantum Key Distribution.- Quality of Service Requirements.- Quality of Service Arc
-
PHP 8 for Absolute Beginners
Apress 出版Embark on a practical journey of building dynamic sites aided by multiple projects that can be easi
-
PHP 8 Basics
Apress 出版Take advantage of PHP 8's powerful features to create basic web applications, solve code tests (req
-
Losing the Cybersecurity War
Ingram 出版This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach
-
Solving Identity Management in Modern Applications
Apress 出版Know how to design and use identity management to protect your application and the data it manages.