-
-
Microsoft Visual C# Step by Step
Ingram 出版Your hands-on guide to Visual C# fundamentals with Visual Studio 2022 Expand your expertise--and t
-
iOS Forensics for Investigators
Packt 出版Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS
-
Policy Design in the Age of Digital Adoption
Packt 出版A proven methodology to build a PolicyOps function and public policy design frameworks for digital
-
-
Reliable Machine Learning
Ingram 出版Whether you're part of a small startup or a multinational corporation, this practical book shows da
-
IoT Security Paradigms and Applications
Ingram 出版Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numer
-
Cyber Storm
Ingram 出版There's a storm brewing, and your business is right in its path! Despite all of the time and money
-
Privacy by Design for the Internet of Things
Ingram 出版Privacy by design is a proactive approach that promotes privacy and data protection compliance thro
-
-
A Brief History of Cyberspace
Ingram 出版With the Internet, a new space, cyberspace, has formed, been rapidly integrated into daily life, an
-
Accelerating DevSecOps on AWS
Packt 出版Build high-performance CI/CD pipelines that are powered by AWS and the most cutting-edge tools and
-
Distributed Computing for Emerging Smart Networks
Springer 出版This book constitutes the refereed proceedings of the Third International Workshop on Distributed C
-
Security and Privacy
Springer 出版This book consists of refereed selected papers from the International Conference on Security & Priv
-
Distributed Machine Learning with Python
Packt 出版Build and deploy an efficient data processing pipeline for machine learning model training in an el
-
Multimedia Forensics
Springer 出版This book is open access. Media forensics has never been more relevant to societal life. Not only m
-
Constructive Side-Channel Analysis and Secure Design
Springer 出版This book constitutes revised selected papers from the 13th International Workshop on Constructive
-
Multimedia Forensics
Springer 出版This book is open access. Media forensics has never been more relevant to societal life. Not only m
-
Building Offline Applications with Angular
Apress 出版Get a complete overview of offline installable applications. Businesses need reliable applications
-
Practical Memory Forensics
Packt 出版A practical guide to enhancing your digital investigations with cutting-edge memory forensics techn
-
Mastering Cyber Intelligence
Packt 出版Develop the analytical skills to effectively safeguard your organization by enhancing defense mecha
-
Selected Areas in Cryptography
Springer 出版This book contains revised selected papers from the 28th International Conference on Selected Areas
-
-
-
Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures and Applications
CRC Press 出版This book unveils the working relationship of blockchain and the fog/edge computing. The contents o
-
Understanding Blockchain and Cryptocurrencies
Ingram 出版You have probably noticed that Blockchains are growing in popularity. Governments are investigating
-
Privacy and Identity Management
Springer 出版This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Packt 出版Master key approaches used by real attackers to perform advanced pentesting in tightly secured infr
-
-
Python Text Mining
Ingram 出版Natural Language Processing (NLP) has proven to be useful in a wide range of applications. Because
-
A Frontend Web Developer's Guide to Testing
Packt 出版Discover expert tips and best practices for maximizing the efficacy of various test automation fram
-
-
Wireless Security Architecture
Wiley 出版Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT se
-
Mastering Azure Security - Second Edition
Packt 出版Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries an
-
Transformers for Natural Language Processing - Second Edition
Packt 出版OpenAI's GPT-3, ChatGPT, GPT-4 and Hugging Face transformers for language tasks in one book. Get a
-
-
-
Cybersecurity and Local Government
Wiley 出版CYBERSECURITY AND LOCAL GOVERNMENT Learn to secure your local government's networks with this one
-
Auditing Corporate Surveillance Systems
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of b
-
How to Start a Podcast
Ingram 出版Everything you need to know about how to grow your own podcast today! Have you been struggling t
-
Verification and Evaluation of Computer and Communication Systems
Springer 出版This book constitutes the proceedings of the 15th International Conference on Verification an
-
Privacy-Preserving Machine Learning
Springer 出版This book provides a thorough overview of the evolution of privacy-preserving machine learning sche
-
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition
Packt 出版Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microso
-
Code-Based Cryptography
Springer 出版This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography,
-
Applications and Techniques in Information Security
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Applications
-
Smart Card Research and Advanced Applications
Springer 出版This book constitutes the proceedings of the 20th International Conference on Smart Card Research a
-
Big Data and Security
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Big Data an
-