-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Packt 出版Master designing, developing, and operating secure infrastructures on Google cloudKey Features: Pre
-
Social Networking Marketing Opportunities and Challenges
Ingram 出版Explores the potential benefits and obstacles associated with using social networking platforms as
-
Online Social Networking Sites Impact
Ingram 出版Online Social Networking Sites delves into the realm of online social networking platforms, seeking
-
Automating Quality Assessment of Social Media Content
Ingram 出版Provides insights into cutting-edge techniques developed to evaluate the quality of context-specifi
-
Internet Addiction and Its Effect on Children
Ingram 出版In today's digital age, where internet access is widespread and readily available, understanding th
-
The Peep & Squeak Easy-to-Read Password Assistance Book (with tabs)
Ingram 出版Let Peep & Squeak help you find those hard to remember things ... we all have to keep so much in ou
-
Preserving Medical Big Data Security with Soft Computing
Ingram 出版This focuses on the security and privacy preservation of medical big data using soft computing tech
-
End-to-End Security for LTE Machine Type Communication
Ingram 出版The "End-to-End Security Scheme for Machine Type Communication (MTC) in LTE Network" presents a com
-
Essentials of Cloud Computing
Springer 出版Numerous advancements are being brought in and incorporated into the cloud domain with the aim of r
-
Discriminatory Content in Social Web
Ingram 出版The rapid growth of web technology and social networks has facilitated contact between people from
-
Detection for Software Defined Networking with Machine Learning
Ingram 出版As the use of Software Defined Networking (SDN) becomes increasingly prevalent, securing these dyna
-
The Active Defender
Wiley 出版Immerse yourself in the offensive security mindset to better defend against attacks In The Active
-
Machine Learning For Humans (6 x 9)
Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
Discovering Internet
The words you provided shed light on a truth we all know deep down-the ever-increasing importance a
-
-
Software Agents Based Web Data Mining
Ingram 出版Software Agents Based Web Data Mining: An Intelligent Approach is the topic of research. Web data m
-
Coercion - Resistant and Verifiable E-Voting System
A coercion-resistant and verifiable e-voting system is a sophisticated electronic voting system des
-
The Peep & Squeak Easy-to-Read Password Assistance Book
Tagger Press 出版An easy-to-read large font book to store passwords and other important information that is importan
-
The Peep and Squeak Password Assistance Book
Tagger Press 出版With enough space to record usernames, passwords, and security questions, this book will help you k
-
Online Social Networks with Computational Intelligence
Ingram 出版The focuses on understanding the concept of opinion leaders within online social networks, employin
-
understanding google
Ingram 出版This thesis explores the impact of search engines within contemporary digital culture and, in parti
-
Contagion Source Detection in Epidemic and Infodemic Outbreaks
Ingram 出版The rapid spread of infectious diseases and online rumors share similarities in terms of their spee
-
Building in Security at Agile Speed
Ingram 出版Today's high-speed and rapidly changing development environments demand equally high-speed security
-
Gradient Expectations
Mit Press 出版An insightful investigation into the mechanisms underlying the predictive functions of neural netwo
-
Dreamweaver Cs3: The Missing Manual
Welcome to Dreamweaver CS3. This new version of the popular web design software offers a rich envir
-
Dreamweaver 8: The Missing Manual
Available for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and
-
Dreamweaver 4 Visual Insight
Readers will learn how to convert text files to Web pages, add/edit Web pages images, make global c
-
SAP Access Control
Ingram 出版Manage on-premise user access with this comprehensive guide to SAP Access Control. Begin with step-
-
Jeff Duntemann’s Drive-By Wi-Fi Guide
Provides everything Wi-Fi users need to know to design, build, protect, and extend a Wi-Fi wireless
-
Dreamweaver 4 F/X and Design
Dreamweaver? 4 f/x and Design improves, enriches, and builds upon the reader's current Dreamweaver
-
ASP.NET 2.0 Black Book
The ASP.Net 2.0 Black Book features immediate solutions that provide hands-on real-world techniques
-
Cisco Network Security Little Black Book
With this concise, problem-solving guide you will learn how to identify network security threats an
-
Outrage Machine
Legacy Lit 出版Amazon's Best History Book of the Month for July 2023 An invaluable guide to understanding how th
-
Securing the Internet of Things Environment against RPL Attacks
Self Publish 出版Kevin Ashton first coined the term Internet of Things in his presentation on automating the supplyc
-
-
Internet access problems
Mobile telephony and the Internet reign supreme in the communications landscape in every corner of
-
Professional Security Management
Routledge 出版Historically, security managers have tended to be sourced from either the armed forces or law enfor
-
-
-
-
The Dark Cloud
Scribe Us 出版A gripping new investigation into the underbelly of digital technology, which reveals not only how
-
Towards Design and Development of Secure and Privacy-Preserving Frameworks for IOT-enabled Networks
With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is buil
-
The study is titled ”SELF-TEL ARCHITECTURE BASED FAULT IDENTIFICATION AND DELAY AWARE DATA MANAGEMENT FOR IOT MOBILE EDGE ENVIRONMENT
Ingram 出版The Internet of Things (IoT) enables autonomous, predictive, and real-time sensing and monitoring o
-
Improving Lifetime Of WSN Using Bio-Inspired Flower Pollination
The Internet of Things is a evolving network linking the physical world with the cyber world. Every
-
Perception of Cyber Security
This book extends the presentation of overview of the cyber security today, its common perception t
-
In-Band Full-Duplex Radios in 6G Networks
Ingram 出版Sixth-generation (6G) wireless communication networks will transform connected things in 5G into co
-
Multicast Authentication Scheme for Energy Conservation
Ingram 出版Conventional methods used in batch signature verification not distinguished between static node sig
-
Concise Encyclopedia of Coding Theory
Ingram 出版Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematic