-
Sicherheitsrisiken in der E-Mobilit瓣t. IT-Sicherheit und Standards der Ladeinfrastruktur
Ingram 出版Forschungsarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,3, Otto-Friedri
-
Artificial Intelligence in Recruiting. A Literature Review on Artificial Intelligence Technologies, Ethical Implications and the Resulting Chances and Risks
Ingram 出版Master's Thesis from the year 2020 in the subject Computer Sciences - Artificial Intelligence, grad
-
Dise簽o de asistente artificial en bibliotecas y usos acad矇micos
Ingram 出版Projektarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Instituto Tecno
-
Rust Web Programming
Packt 出版Adopt the Rust programming language by learning how to build fully functional web applications and
-
Cybersecurity Now
Ingram 出版The Importance of Cybersecurity Now As we look back on 2020, there are many things we have learned,
-
Mastering Veeam Backup & Replication 10
Packt 出版Gain proficiency in monitoring infrastructure along with focusing on cloud backup and recovery Key
-
Incident Response in the Age of Cloud
Packt 出版Learn to identify security incidents and build a series of best practices to stop cyber attacks bef
-
Cryptography, Information Theory, and Error-Correction
Wiley 出版CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION A rich examination of the technologies sup
-
Tactile Internet
Ingram 出版Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focus
-
Secure Edge Computing
Ingram 出版The internet is making our daily life as digital as possible and this new era is called the Interne
-
Big Breaches
Apress 出版The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundred
-
Hacking with Kali-Linux
Ingram 出版In my work, I keep coming across networks and websites with significant security problems. In this
-
Online Social Networks Security
Ingram 出版This book elaborates on various attacks on Social Networks with classifications, countermeasures an
-
Distributed Denial of Service (Ddos) Attacks
Ingram 出版This book is designed for readers who have an interest in the cyber security domain, including stud
-
Zabbix 5 IT Infrastructure Monitoring Cookbook
Packt 出版Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Windows
-
The Cyber-Elephant in the Boardroom
Ingram 出版We've all read the cybersecurity horror stories: a prominent company exposes the private informatio
-
Security, Privacy, and Anonymity in Computation, Communication, and Storage
Springer 出版This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are hel
-
Digital Hate
Ingram 出版The euphoria that has accompanied the birth and expansion of the internet as a liberation technolog
-
The User’s Journey
Ingram 出版Like a good story, successful design is a series of engaging moments structured over time. The User
-
Service Design
Ingram 出版Service Design is an eminently practical guide to designing services that work for people. It offer
-
Cyber-Physical Security for Critical Infrastructures Protection
Springer 出版This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physica
-
Ich hacke Technik
Ingram 出版Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten H瓣lfte mein
-
Eye Tracking the User Experience
Ingram 出版Eye tracking is a widely used research method, but there are many questions and misconceptions abou
-
Practical Empathy
Ingram 出版Conventional product development focuses on the solution. Empathy is a mindset that focuses on peop
-
Build Better Products
Ingram 出版It's easier than ever to build a new product. But developing a great product that people actually w
-
Penetration Testing Step By Step Guide
Ingram 出版This book is intended for people who have no prior knowledge of penetration testing, ethical hackin
-
Managing Chaos
Ingram 出版Few organizations realize a return on their digital investment. They're distracted by political inf
-
Content Everywhere
Ingram 出版Care about content? Better copy isn't enough. As devices and channels multiply-and as users expect
-
Why We Fail
Ingram 出版Just as pilots and doctors improve by studying crash reports and postmortems, experience designers
-
Digital Forensics and Watermarking
Springer 出版This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and
-
Cybersecurity ABCs
Ingram 出版Cybersecurity problems don't always relate to technological faults. Many can be avoided or mitigate
-
Security in Computing and Communications
Springer 出版This book constitutes revised selected papers of the 8th International Symposium on Security in Com
-
Information and Communication Technology and Applications
Springer 出版This book constitutes revised selected papers from the Third International Conference on Informatio
-
The #ArtOfTwitter
Ingram 出版MASTERING TWITTER IS THE MOST POWERFUL WAY TO GET YOUR VOICE HEARD AS A CREATIVE PROFESSIONAL In
-
The Theory of Hash Functions and Random Oracles
Springer 出版Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in
-
Modern Front-End Architecture
Apress 出版Learn how to build front-end applications that can help you ship applications faster with fewer def
-
CX Trinity
Ingram 出版CX Trinity explores three key facets of customer experience (CX): how we talk to customers, the con
-
Information Security and Cryptology
Springer 出版This book constitutes the post-conference proceedings of the 16th International Conference on Infor
-
Privacy and Identity Management. Data for Better Living: AI and Privacy
Springer 出版This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
Information Security and Cryptology - Icisc 2020
Springer 出版This book constitutes selected papers from the 23rd International Conference on Information Securit
-
Building Vue.js Applications with GraphQL
Packt 出版Take your Vue.js knowledge to the next level by understanding full-stack development concepts and e
-
Euro-Par 2020: Parallel Processing Workshops
Springer 出版This book constitutes revised selected papers from the workshops held at the 26th International Con
-
Artificial Intelligence and Social Work
Ingram 出版This book marries social work and artificial intelligence to provide an introductory guide for usin
-
Data Protection Officer
Ingram 出版This book provides a practical guide to the DPO role, encompassing the key activities you'll need t
-
Software-Defined Networks
Ingram 出版Software-Defined Networks (SDN) are transforming the Internet by replacing bundled, proprietary har
-
Advanced Natural Language Processing with TensorFlow 2
Packt 出版One-stop solution for NLP practitioners, ML developers and data scientists to build effective NLP s
-
Cybersecurity for Connected Medical Devices
Ingram 出版The cybersecurity of connected medical devices is one of the biggest challenges facing healthcare t
-
Hybrid Encryption Algorithm Over Wireless Communication Channels
Ingram 出版This book presents novel hybrid encryption algorithms that possess many different characteristics.