-
IBM Watson Solutions for Machine Learning
Ingram 出版Utilize Python and IBM Watson to put real-life use cases into production. Key Features ● Use of
-
Modernizing Enterprise CMS Using Pimcore
Packt 出版A practical guide to developing, administering, and scaling content management solutions in your or
-
Social Media Marketing
Ingram 出版SOCIAL MEDIA MARKETINGToday, platforms like Facebook, Twitter, and Instagram are making it amazingl
-
Social Media Marketing
Ingram 出版SOCIAL MEDIA MARKETING Today, platforms like Facebook, Twitter, and Instagram are making it amazing
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 18th International Conference on Detection of Intrusio
-
Not Just Chatting
Ingram 出版"Bravo! Who would have thought such a vast variety of ways to be entertained, educated, soothed, an
-
Rapid Application Development with AWS Amplify
Packt 出版Get to grips with the AWS Amplify framework and use it to build scalable cloud-native progressive w
-
Innovations in Digital Economy
Springer 出版This book constitutes the revised and extended papers of the Second International Conference on Inn
-
Set Up Your Own Platform
Ingram 出版Wouldn't you like to have your own platform for your personal or business website instead of depend
-
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Advanced Cybersecurity Technologies
CRC Press 出版This book looks at the technical fields of Cybersecurity progressively, building up in layers befor
-
Advances in Cryptology - Crypto 2021
Springer 出版The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed p
-
Cybersecurity and Third-Party Risk
Wiley 出版Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the
-
Computer Safety, Reliability, and Security. Safecomp 2021 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the proceedings of the 40th International Conference on Computer Safety, Reli
-
A Practical Introduction to Enterprise Network and Security Management
Ingram 出版A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a
-
Die Post-Quanten-Kryptographie. Ein ?berblick
Ingram 出版Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - IT-Security, Note: 1,0, Technische Univ
-
A Practical Introduction to Enterprise Network and Security Management
Ingram 出版A Practical Introduction to Enterprise Network and Security Management is written for people who ar
-
Natural Language Processing Fundamentals for Developers
Ingram 出版This book is for developers who are looking for an overview of basic concepts in Natural Language P
-
Nonlinear Control Systems Using Matlab(r)
Ingram 出版The development of computer software for nonlinear control systems has provided many benefits for t
-
Not Just Chatting
Ingram 出版"Bravo! Who would have thought such a vast variety of ways to be entertained, educated, soothed, an
-
-
Private Security and the Law
Ingram 出版Private Security and the Law, 5e, is a singular resource that provides the most comprehensive analy
-
Wireless Communication Networks Supported by Autonomous Uavs and Mobile Ground Robots
Ingram 出版Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wirele
-
Machine Learning for Biometrics
Ingram 出版Machine Learning for Biometrics: Concepts, Algorithms and Applications highlights the fundamental c
-
Microelectronic Devices, Circuits and Systems
Springer 出版This book constitutes selected papers from the Second International Conference on Microelectronic D
-
Reputation Systems in Web3
Ingram 出版Organizational structures are shifting from classical hierarchical firms from before the emergence
-
Modern Socio-Technical Perspectives on Privacy
Springer 出版This open access book provides researchers and professionals with a foundational understanding of o
-
Modern Socio-Technical Perspectives on Privacy
Springer 出版This open access book provides researchers and professionals with a foundational understanding of o
-
5g Wireless
Addison-Wesl 出版Gain a Deep, Practical Understanding of 5G Technology, Applications, Architecture, Standards, and E
-
Choose Your Infosec Path
Apress 出版Cybersecurity is a pressing issue across industries, as well as increasingly important in people's
-
Screen Time Is Not Forever
Ingram 出版Children learn boundaries and safety when using screens, and fun things to do when screens are off.
-
Socio-Technical Aspects in Security and Trust
Springer 出版This book constitutes the refereed post-conference proceedings of the 10th International Workshop o
-
Screen Time Is Not Forever
Ingram 出版Help young children learn screen-time boundaries and fun ways to spend "screens-off" time. As imp
-
21st Century Prometheus
Springer 出版Introduction.- Part I The Changing CBRN Risk Landscape.- The XXI Century: The Epoch of Advanced Mil
-
Computing Meaning
Springer 出版This book is a collection of papers by leading researchers in computational semantics. It presents
-
Securing Systems
Ingram 出版Internet attack on computer systems is pervasive. It can take from less than a minute to as much as
-
Kids and Today’s Media
Ingram 出版Old and new media are adversely effecting children in many ways. The doctors in this volume discuss
-
Kids and Today’s Media
Old and new media are adversely effecting children in many ways. The doctors in this volume discuss
-
The Art of Micro Frontends
Packt 出版Apply your experience of web development with HTML and JavaScript to build micro frontends for larg
-
The 60-Minute Podcast Startup
Ingram 出版How to start and monetize a podcast in one month Would you like to turn your podcast idea into a vi
-
Advances in Cybersecurity Management
Springer 出版This book concentrates on a wide range of advances related to IT cybersecurity management. The topi
-
Cyber Security Cryptography and Machine Learning
Springer 出版This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security
-
Fundamentals of Cryptography
Springer 出版Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is co
-
Antivirus Bypass Techniques
Packt 出版Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key