-
Computer Network Simulation Using Ns2
Ingram 出版This book provides a solid foundation of computer networking knowledge and skills, covering everyth
-
Vlsi-Soc: New Technology Enabler
Springer 出版This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 1
-
The Content Marketing Playbook - Strategies to Attract the Right Customers
Ingram 出版Are you interested in learning how content marketing can improve your business and profits? Tired o
-
Security Risk Management for the Internet of ThingsTechnologies and Techniques for IoT Sec
Ingram 出版In recent years, the rising complexity of Internet of Things (IoT) systems has increased their pote
-
Geospatial Data Science Techniques and Applications
Ingram 出版The lack of a clear understanding of geoscience science data techniques and related uncertainties c
-
Telegeoinformatics
Ingram 出版This unique book covers the theory, technologies, and applications of telegeoinformatics in some de
-
Social Network Analysis
Ingram 出版The book addresses the issue of interdisciplinary understanding of collaboration on the topic of so
-
Practical User ResearchEverything You Need to Know to Integrate User Research to Your Prod
Apress 出版Explore how User Research has been influenced over the years by a range of disciplines, such as HCI
-
Mobile Ad Hoc Networks
Ingram 出版Centralized approach for routing in Mobile Ad Hoc Networks (MANETs) lack scalability and fault-tole
-
Statistical Methods in Computer Security
Ingram 出版Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistica
-
Mobile Cloud Computing
Ingram 出版Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction
-
Cable and Wireless Networks
Ingram 出版This book presents a comprehensive approach to networking, cable and wireless communications, and n
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 17th International Conference on Detection of Intrusio
-
Transforming Information SecurityOptimizing Five Concurrent Trends to Reduce Resource Drai
Ingram 出版Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty ex
-
Vehicular Social Networks
Ingram 出版The book provides a comprehensive guide to vehicular social networks. The book focuses on a new cla
-
Internet Infrastructure
Ingram 出版This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless
-
AI Self-Driving Cars DivulgementPractical Advances In Artificial Intelligence And Machine Learning
Ingram 出版A vital book by industry thought leader and global AI expert, Dr. Lance Eliot, and based on his pop
-
Mastering Windows Security and HardeningSecure and protect your Windows environment from i
Packt 出版Enhance Windows security and protect your systems and servers from various cyber attacks Key Featur
-
Hands-On Natural Language Processing with PyTorch 1.x
Packt 出版Become a proficient NLP data scientist by developing deep learning models for NLP and extract valua
-
-
SQL Injection Strategies
Packt 出版Learn to exploit vulnerable database applications using SQL injection tools and techniques, while u
-
Node.js Web Development - Fifth Edition
Packt 出版Build scalable web applications using Node.js, Express.js, and the latest ECMAScript techniques, al
-
Web Form Design
Ingram 出版Forms make or break the most crucial online interactions: checkout (commerce), registration (commun
-
Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data
Springer 出版This book constitutes the refereed proceedings of the 14th China National Conference on Computation
-
Intelligent Robotics and Applications
Springer 出版Mobile robots and intelligent autonomous systems.- Intelligent system and cybernetics.- Robot mecha
-
100 Things Every Designer Needs to Know about People
New Riders 出版Apply psychology and behavioral science to web, UX, and graphic design Behavioral science leader an
-
K羹nstliche Intelligenz verstehen. Wie funktionieren die Methoden ”Sensitivity Analysis” (S
Ingram 出版Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1.0, Fern
-
Virtuele particuliere netwerken in theorie en praktijk
Ingram 出版Dit boek behandelt zowel theoretische als praktische technologie禱n van het virtuele priv矇-netwerk.
-
-
-
Digital DownfallTechnology, Cyberattacks and the End of the American Republic
Ingram 出版Is America on the brink of civil war?Could foreign cyber plots turn Americans against one another a
-
Ict Systems Security and Privacy Protection34th Ifip Tc 11 International Conference, SEC 2
Springer 出版This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on I
-
-
Linux for Hackers
Ingram 出版The book, 'Linux for Hackers: The Advanced Guide on Kali Linux Operating System, ' contains condens
-
The Art of Hacking
Ingram 出版From Sun Tzu to Machiavelli, from Thucydides to Musashi, and more, the teachings of the greatest mi
-
Building an Effective Security Program
Ingram 出版Building an Effective Security Program provides readers with a comprehensive approach to securing t
-
Adventures Of Full Stack Software Development
Blurb 出版Master the skills required to become a Full Stack Software Developer. In this book you will learn h
-
API SuccessThe Journey to Digital Transformation
Ingram 出版Authoritative advice on creating and running a successful API program. The number of articles, book
-
Linux for Hackers
Ingram 出版Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a
-
Practical Natural Language ProcessingA Pragmatic Approach to Processing and Analyzing Lang
Ingram 出版Many books and courses tackle natural language processing (NLP) problems with toy use cases and wel
-
-
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies
Ingram 出版The practical and conceptual knowledge you need to attain CCNP Enterprise certification From one
-
-
Intrusion Detection System for Wireless Sensor Networks
Ingram 出版Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development
-
How to Discuss Politics OnlineStop Falling for %$*!#@ Marketing Tactics
Ingram 出版"How To Discuss Politics Online" will help you spot marketing tactics and help you make better deci
-
Podcasting - The little Book of Podcasting
Ingram 出版Do you want to share your message or passion with an eager audience?Are you interested in taking ad
-
Unhackable
Ingram 出版Terrified about identity theft and data breaches? Discover a foolproof method to protect your infor