-
SSL/TLS Under Lock and Key
Ingram 出版If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This boo
-
Tor Anonymity Network 101
Ingram 出版Hvis du har s繪gt efter adgang til den mest private og sikre del af internettet, har du fundet den!
-
Interoperability in Iot for Smart Systems
Ingram 出版Interoperability in IoT for Smart Systems discusses the different facets of interoperability issues
-
Crypto Wars
Ingram 出版The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied t
-
-
Security Awareness for Dummies
For Dummies 出版Make security a priority on your team Every organization needs a strong security program. One re
-
Computer Security - Esorics 2020
Springer 出版The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium
-
Melee is Broken
Lulu.com 出版In a world where most video game players crave the newest hardware or the latest game, one tight-kn
-
Information Security
Springer 出版This book constitutes the proceedings of the 23rd International Conference on Information Security,
-
Security, Privacy, and Applied Cryptography Engineering
Springer 出版This book constitutes the refereed proceedings of the 10th International Conference on Security, Pr
-
Blockchain with Hyperledger Fabric, Second Edition
Packt 出版Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with
-
Theoretical Issues in Natural Language Processing
Psychology 出版Accompanying continued industrial production and sales of artificial intelligence and expert system
-
-
Computer Security
Springer 出版This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on
-
Data Privacy Management, Cryptocurrencies and Blockchain Technology
Springer 出版This book constitutes the revised selected post conference proceedings of the 15th International Wo
-
-
The Next Generation Vehicular Networks, Modeling, Algorithm and Applications
Springer 出版This book proposes the novel network envisions and framework design principles, in order to systema
-
Il Guerriglia-Marketing per il successo del tuo sito web
Ingram 出版Sebastian Merz ha lavorato come consulente in diverse aziende di successo e per individui privati,
-
Practical Git
Apress 出版Practice your Git skills using exercises in your own environment. This book introduces concepts in
-
R3 in Geomatics: Research, Results and Review
Springer 出版This book constitutes the refereed proceedings of the First International Workshop in memory of Pro
-
Building Native Web Components
Apress 出版Start developing single-page applications (SPAs) with modern architecture. This book shows you how
-
Cloud Computing, Big Data & Emerging Topics
Springer 出版This book constitutes the revised selected papers of the 8th International Conference on Cloud Comp
-
70 Tips and Tricks for Mastering the Cissp Exam
Apress 出版Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly differ
-
Model-Driven Simulation and Training Environments for Cybersecurity
Springer 出版This book constitutes the refereed post-conference proceedings of the Second International Workshop
-
Human Mental Workload: Models and Applications
Springer 出版This book constitutes the refereed proceedings of the 4th International Symposium on Human Mental W
-
A Complete Guide to Burp Suite
Apress 出版Use this comprehensive guide to learn the practical aspects of Burp Suite--from the basics to more
-
Machine Learning for Cyber Security
Springer 出版This three volume book set constitutes the proceedings of the Third International Conference on Mac
-
Blockchain and Trustworthy Systems
Springer 出版This book constitutes the thoroughly refereed post conference papers of the Second International Co
-
Machine Learning for Cyber Security
Springer 出版This three volume book set constitutes the proceedings of the Third International Conference on Mac
-
The Pentester Blueprint
Wiley 出版JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guid
-
Machine Learning for Cyber Security
Springer 出版This three volume book set constitutes the proceedings of the Third International Conference on Mac
-
Pioneering Advances for AI Driverless Cars
Ingram 出版Based on his popular AI Insider series and podcasts, this vital book by industry thought leader and
-
-
Frontiers in Cyber Security
Springer 出版This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber S
-
Verification and Evaluation of Computer and Communication Systems
Springer 出版This book constitutes the proceedings of the 14th International Conference on Verification and Evalu
-
Information, Communication and Computing Technology
Springer 出版This book constitutes the refereed proceedings of the 5th International Conference on Information,
-
Self-Stabilization
Mit Press 出版Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of design
-
-
Cyber Security
Ingram 出版Are you afraid of getting hacked? Knowing how to protect yourself from hackers is a super valuable
-
Graphical Models for Security
Springer 出版This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Sec
-
Integration von python-basierten Vorhersagemodellen in ein Monitoring-Webdashboard
Ingram 出版Bachelorarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1,0, Fac
-
Distributed Computing for Emerging Smart Networks
Springer 出版This book constitutes the refereed proceedings of the Second International Workshop on Distributed
-
-
Advanced Communication Systems and Information Security
Springer 出版This book constitutes selected papers of the Second International Conference on Advanced Communicat
-
Ospf and Is-Is
Ingram 出版This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSP
-
The Cybersecurity Maturity Model Certification (CMMC)
Ingram 出版The United States DoD (Department of Defense) is one of the largest employers in the world, with ab
-
Learning by Practicing - Mastering TShark Network Forensics
Ingram 出版The book you have been waiting for to make you a Master of TShark Network Forensics, is finally her
-
Business Data Communications and Networking
Wiley 出版Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to t