-
Cloud Reliability Engineering
Ingram 出版Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarante
-
Digital Forensics Explained
Ingram 出版Digital Forensics Explained, 2nd edition, covers the full life cycle of conducting a mobile and com
-
Interactivity and Game Creation
Springer 出版This book constitutes the refereed post-conference proceedings of the 9th International Conference
-
Using Science in Cybersecurity
Ingram 出版Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough t
-
Protective Security
Apress 出版This book shows you how military counter-intelligence principles and objectives are applied. It pro
-
Guide to Web Development with Java
Springer 出版This comprehensive Guide to Web Development with Java introduces the readers to the three-tiered, M
-
Production Research
Springer 出版This two-volume set presents selected and revised papers from the 10th International Conference of
-
Production Research
Springer 出版This two-volume set presents selected and revised papers from the 10th International Conference of
-
Exploring Malicious Hacker Communities
Ingram 出版Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication
-
Deep Learning for Internet of Things Infrastructure
Ingram 出版This book promotes and facilitates exchanges of research knowledge and findings across different di
-
Social Media Anxiety and Addiction
Ingram 出版Do you find yourself missing out on those "in the moment" moments? Do you find yourself continuall
-
TLS Mastery
Ingram 出版Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your pas
-
-
TLS Mastery
Ingram 出版Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your pas
-
TLS Mastery
Ingram 出版Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your pas
-
Privacy and Identity Management
Springer 出版This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
The Doctor's In
Ingram 出版The Doctor's In: Treating America's Greatest Cyber Security Threat By: Alan D. Weinberger Many have
-
Technological Innovation for Life Improvement
Springer 出版This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Linkedin for Dummies
For Dummies 出版Brand yourself like a pro on LinkedIn LinkedIn multiplies what you know by the power of who you kn
-
Security and Privacy
Springer 出版This book consists of refereed selected papers from the International Conference on Security & Priv
-
Homeland Security and Private Sector Business
Ingram 出版Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protectin
-
Applied Technologies
Springer 出版This volume constitutes the refereed proceedings of the Second International Conference on Applied
-
Stone Age Code
Ingram 出版Acclaim for Stone Age Code: "The book is simply brilliant and genuine, so friendly and stimulating
-
Strategic Security
Ingram 出版Strategic Security provides security managers, and those aspiring to the position, to think strateg
-
Culture and International Law
Ingram 出版Papers from the International Conference of the Centre of International Law Studies (CILS 2018). Th
-
Routledge Handbook of South Asian Criminology
Routledge 出版This book covers crime, criminal justice and victimization in Afghanistan, Bangladesh, India, Nepal
-
Wireless Network Security
Ingram 出版The book deals with the topic of wireless communication, which has become popular in organizations
-
Software-Defined Networking and Security
Ingram 出版This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense.
-
LastPass Guide
Ingram 出版What People Say "Online security is no joke, and Ben is definitely the voice to listen to on this s
-
How Not To Get Hacked
Lulu.com 出版Do you think you are safe when browsing online? Thousands of people are scammed everyday resulting
-
The Ciso’s Next Frontier
Springer 出版This book provides an advanced understanding of cyber threats as well as the risks companies are fa
-
Cryptographic Methods
Ingram 出版This textbook provides a piece of adequate information about cryptographic methods, which are of pa
-
Cryptographic Methods
Ingram 出版This textbook provides a piece of adequate information about cryptographic methods, which are of pa
-
The Natural Language for Artificial Intelligence
Ingram 出版The Natural Language for Artificial Intelligence presents the biological and logical structure typi
-
Deno Web Development
Packt 出版Learn how to use Deno, the secure JavaScript and TypeScript runtime written in Rust, to write relia
-
A Hacker I Am Vol 2
Ingram 出版This book is the second book in the "A Hacker, I Am" series, it is not your normal cybersecurity bo
-
Build Your Blog Step-By-Step
Ingram 出版Do you want to start a blog, but you're unsure where to start? Are you in the middle of building a
-
Equity of Cybersecurity in the Education System
AuthorHouse 出版Every organization faces cyberthreats, cyberattacks, and technology breaches. Schools are no differ
-
Cybersecurity in the Covid-19 Pandemic
Ingram 出版This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemi
-
Cloud Computing Basics
Apress 出版Regardless of where your organization is in your cloud journey, moving to the cloud is an inevitabi
-
-
Outlier Detection Using A New Hybrid Approach On Mixed Dataset
Ingram 出版Data mining is a process of extracting hidden and useful information from the data. Outlier detecti
-
Building Web Apps with Python and Flask
Ingram 出版A practical guide for the rapid web application development with FlaskKey Features Expert-led cover
-
The Secure Board
Ingram 出版With the collective global spend on cyber security projected to reach $433bn by 2030, the impact of
-
Integrating D3.Js with React
Apress 出版Integrate D3.js into a React TypeScript project and create a chart component working in harmony wit
-
Cyberspace Safety and Security
Springer 出版The LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety
-
Practical Hardware Pentesting
Packt 出版Explore embedded systems pentesting by applying the most common attack techniques and patterns Key
-
Extending Gatsby
Apress 出版Expand your Gatsby development skills by building a production-ready blog website. This book teache