-
The Security Hippie
Ingram 出版The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fraction
-
Real-Time Twilio and Flybase
Apress 出版Use Flybase and Twilio with Node.js to build real-time solutions and understand how real-time web t
-
A quantum battery that never runs out
Blurb 出版Are you tired of charging your smartphone everyday? Are you tired of using the regular generators a
-
The Security Hippie
Ingram 出版In this new book, Barak looks at security purely through the lens of story-telling, sharing many an
-
The Insider Threat
Ingram 出版This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a p
-
Learn Clip Studio Paint - Third Edition
Packt 出版Discover the tools to tell your own manga story with Clip Studio Paint and develop your digital dra
-
Cognitive Hack
Ingram 出版This book explores a broad cross section of research and actual case studies to draw out new insigh
-
Building Enterprise Iot Applications
Ingram 出版This book covers all aspects of Internet of Things (IoT) software development from startup, industr
-
Security and Auditing of Smart Devices
Ingram 出版Most organizations have been caught off-guard with the proliferation of smart devices. The IT organ
-
Angular Cookbook
Packt 出版Discover actionable solutions to everyday problems in building applications with Angular and TypeSc
-
Open Source Intelligence and Cyber Crime
Springer 出版This book shows how open source intelligence can be a powerful tool for combating crime by linking
-
Efficient Integration of 5g and Beyond Heterogeneous Networks
Springer 出版This book discusses the smooth integration of optical and RF networks in 5G and beyond (5G+) hetero
-
A Vulnerable System
Ingram 出版As threats to the security of information pervade the fabric of everyday life, A Vulnerable System
-
Mastering Transformers
Packt 出版Take a problem-solving approach to learning all about transformers and get up and running in no tim
-
Telecom Extreme Transformation
Ingram 出版The next wave of telecommunication and service provider transformations will be very different, we
-
Dad's Secret Password Book
Lulu.com 出版A special gift for Dad! A perfect logbook for storing your internet usernames and passwords. This h
-
Mum's Secret Password Book
Lulu.com 出版A special gift for Mum! A perfect logbook for storing your internet usernames and passwords. This h
-
Instagram Marketing
Ingram 出版INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for
-
Grandad’s Secret Password Book
Lulu.com 出版A special gift for Grandad! A perfect logbook for storing your internet usernames and passwords. Th
-
Nan's Secret Password Book
Lulu.com 出版A special gift for Nan! A perfect logbook for storing your internet usernames and passwords. This h
-
Instagram Marketing
Ingram 出版INSTAGRAM MARKETING Instagram has a simple and user-friendly interface that makes it accessible for
-
Personalized Privacy Protection in Big Data
Springer 出版This book presents the data privacy protection which has been extensively applied in our current er
-
Privacy-Preserving Deep Learning
Springer 出版Introduction.- Definition and Classification.- Background Knowledge.- X-based Hybrid PPDL.- The Gap
-
Vlsi-Soc: New Technology Enabler
Springer 出版This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 1
-
Selected Areas in Cryptography
Springer 出版This book contains revised selected papers from the 27th International Conference on Selected Areas
-
Applications and Usability of Interactive TV
Springer 出版This book constitutes the refereed proceedings of the 9th Iberoamerican Conference on Applications
-
Attribution of Advanced Persistent Threats
Ingram 出版An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer
-
Applied Cryptography and Network Security Workshops
Springer 出版This book constitutes the proceedings of the satellite workshops held around the 19th International
-
Deep Learning with fastai Cookbook
Packt 出版Harness the power of the easy-to-use, high-performance fastai framework to rapidly create complete
-
Threat Hunting with Elastic Stack
Packt 出版Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security featur
-
Get Good or Get Off
Ingram 出版Social media is a powerful set of tools, that can build your brand, connect you to your customers a
-
Practical Machine Learning for Computer Vision
Ingram 出版This practical book shows you how to employ machine learning models to extract information from ima
-
Future Access Enablers for Ubiquitous and Intelligent Infrastructures
Springer 出版This book constitutes the refereed post-conference proceedings of the 5th International Conference
-
Vlsi-Soc: Design Trends
Springer 出版This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 1
-
Quantum Algorithms for Cryptographically Significant Boolean Functions
Springer 出版1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover's Algorithm and Walsh Spectrum.-
-
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
Packt 出版A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for
-
Data and Applications Security and Privacy XXXV
Springer 出版This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data a
-
Tracing Attackers with Trust-Based Deterministic Packet Marking
Ingram 出版Computer network attacks are on the increase and are more sophisticated in today's network environm
-
Post-Quantum Cryptography
Springer 出版This volume constitutes the proceedings of the 12th International Conference on post-quantum crypto
-
Cryptography
Ingram 出版Despite its reputation as a language only of spies and hackers, cryptography plays a critical role
-
Resell Rights Questions Answered
Ingram 出版Exchange Rights can sound all "outsider" to you particularly in the event that you are new to the s
-
Cloud Security Band 2
Digitalisierung, Industrie 4.0 und Economy 4.0 sind Schlagworte, die unsere Gesellschaft und die Un
-
Handbook on wireless mesh network
Ingram 出版Wireless Mesh networks are more and more frequently seen as a solution to large-scale tracking and
-
Surveys That Work
Ingram 出版Surveys That Work explains a seven-step process for designing, running, and reporting on a survey t
-
Mobility Management in CoAP-Based IoT Networks
Ingram 出版From recently, the innovative technology named as Constrained Application Protocol (CoAP) has been
-
Analyse des Datensatzes wage2 mit der Programmiersprache R
Ingram 出版Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - IT-Security, Note: 2,0, FOM Hochschule
-
Security in MANET’S by using Symmetric Key Cryptography
Ingram 出版The current textbook is about the security in mobile ad-hoc networks by using cryptographic secrete
-
The Little Book of Sitecore(R) Tips
Ingram 出版In Volume 2 I stated sequels are never as good, that means by this point you must be a sucker for p