-
Cybersecurity Leadership Demystified
Packt 出版Gain useful insights into cybersecurity leadership in a modern-day organization with the help of us
-
Encyclopedia of Crash Dump Analysis Patterns, Volume 2, L-Z
Ingram 出版This reference reprints with corrections, additional comments, and classification more than 370 alp
-
Memory Dump Analysis Anthology, Volume 5, Revised Edition
Ingram 出版This reference volume consists of revised, edited, cross-referenced, and thematically organized art
-
The Cybersecurity Mindset
Ingram 出版Securing an organization's assets and understanding the cybersecurity blueprint goes beyond the tec
-
The Cybersecurity Mindset
Ingram 出版Securing an organization's assets and understanding the cybersecurity blueprint goes beyond the tec
-
-
Navigating Hyperspace
Ingram 出版Like a hurricane that exposes the underlying bedrock--and an occasional hidden treasure--by washing
-
KI 2021: Advances in Artificial Intelligence
Springer 出版This book constitutes the refereed proceedings of the 44th German Conference on Artificial Intellig
-
PocketFocus Notebook
Lulu.com 出版PocketFocus Notebooks are single-project notebooks for designers, marketers, artists, project manag
-
Mediated Interfaces
Ingram 出版Images of faces, bodies, selves and digital subjectivities abound on new media platforms like Snapc
-
Critical Information Infrastructures Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Critical Inf
-
Communication, Networks and Computing
Springer 出版This book constitutes selected and revised papers presented at the Second International Conference
-
Redesigning Wiretapping
Springer 出版This book tells the story of government-sponsored wiretapping in Britain and the United States from
-
-
Cryptography and Coding
Springer 出版This book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptogr
-
Advanced Smart Computing Technologies in Cybersecurity and Forensics
Ingram 出版This book addresses the topics related to artificial intelligence, internet of things, blockchain t
-
Access, Resource Sharing and Collection Development
Routledge 出版This book, first published in 1996, explores the role of libraries in acquiring, storing, and disse
-
Agile Security Operations
Packt 出版Get to grips with security operations through incident response, the ATT&CK framework, active defen
-
Phishing and Communication Channels
Apress 出版Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email at
-
Critical Infrastructure Protection XIV
Springer 出版The information infrastructure - comprising computers, embedded devices, networks and software syst
-
60 Days to LinkedIn Mastery
Ingram 出版There's only one place in the world where you can find and connect with hundreds of millions of pro
-
Progress in Cryptology - Indocrypt 2021
Springer 出版This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology i
-
-
e-Learning in Medical Physics and Engineering
Ingram 出版This practical guide provides educators, programme administrators, and school directors with step-b
-
Cryptology and Network Security
Springer 出版This book constitutes the refereed proceedings of the 20th International Conference on Cryptology a
-
Bulletproof TLS and PKI, Second Edition
Ingram 出版Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure server
-
CISSP Examination Review Guide
Ingram 出版- The SEMAIS CISSP study guide aims to help testing candidates synthesize and summarize relevant CI
-
Securing 5g and Evolving Architectures
Addison-Wesl 出版SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the ben
-
Security and Trust Management
Springer 出版This book constitutes the proceedings of the 17th International Workshop on Security and Trust Mana
-
Information Systems Security
Springer 出版This book constitutes the proceedings of the 17th International Conference on Information Systems S
-
-
Software Design Patterns for Java Developers
Ingram 出版PracticeDesign Patterns to Enrich and Streamline Software DevelopmentKey FeaturesClassify design pa
-
Beginning React and Firebase
Apress 出版Use React with Firebase to build four beginner-friendly apps. A lot of React tutorials out there to
-
Computational Analysis of Storylines
Ingram 出版Event structures are central in Linguistics and Artificial Intelligence research: people can easily
-
Webflow by Example
Packt 出版Build modern responsive websites without writing code by making the most of the power and flexibili
-
Microsoft Sentinel in Action - Second Edition
Packt 出版Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event m
-
Spring REST
Apress 出版Design and develop Java-based RESTful APIs using the latest versions of the Spring MVC and Spring B
-
The Next Floor
Lulu.com 出版This is a story about how 185 residents of a newly commissioned, multi-story Village Apartments in
-
Blockchain and Trustworthy Systems
Springer 出版This book constitutes the thoroughly refereed post conference papers of the Third International Con
-
Risk Control Theory of Online Transactions
Online transaction has become an important part of the new economy and finance. At the same time, t
-
-
Information Security
Springer 出版This book constitutes the proceedings of the 24rd International Conference on Information Security,
-
Certified Information Security Manager Exam Prep Guide
Packt 出版Pass the Certified Information Security Manager (CISM) exam and implement your organization's secur
-
PHP/Architect's Guide to Date and Time Programming
Ingram 出版If your development involves working with dates and times, then this book is a must-have. In this b
-
Cisco Data Center Fundamentals
Cisco Press 出版Get ready to configure and operate modern data centers--and move up to high-value CCNP Data Center
-
The Online World, What You Think You Know and What You Don't
Ingram 出版Every Child Who Has Access to a Smartphone, Tablet, Computer, or Video Games is at Risk! But NOW Yo
-
Cybersecurity Risk Management
Wiley 出版Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using
-
Human Mental Workload
Springer 出版This book constitutes the refereed proceedings of the 5th International Symposium on Human Mental W