-
Optimized TCP Congestion Control Protocol
The objective of the Transmission Control Protocol (TCP) is to provide reliable end-to-end delivery
-
DNA Cryptography Using Quantum Computing
Ingram 出版The prime concern in data communication over a transmission channel is the security of the data whi
-
Reliable Internet of Things Communication and Service Discover
The Internet of Things is a many vision one paradigm technology that connects electrical, electroni
-
15-Minute Focus: Digital Citizenship: Supporting Youth Navigating Technology in a Rapidly Changing World
Ingram 出版Are you looking for expert guidance and engaging tools to help students navigate their complex digi
-
Securing ChatGPT
"Securing ChatGPT: Best Practices for Protecting Sensitive Data in AI Language Models" is a must-re
-
Celebrity, Persuasion and Social Media
Ingram 出版A new type of celebrity known as a digital influencer has emerged due to the accelerated uptake of
-
An Efficient Vertical Handoff Decision Scheme
Ingram 出版The next generation wireless networks are expected to support different applications within a heter
-
Introduction To Cyber Forensics & Investigation
Ingram 出版In the civil and criminal justice systems, computer forensics helps ensure the integrity of digital
-
Modern Web Development with Go
Ingram 出版Build fast, scalable web server applications by harnessing the power of solution-driven programming
-
Clear Light
The Singularity is not a union of flesh and machine. Rather, the Singularity is a union of mind to
-
3D Reconstruction with Deep Learning
3D Reconstruction with Deep Learning" by Rocher is a comprehensive guide to the field of 3D reconst
-
Can digital technology impact the product strategy of companies?
Ingram 出版En quelques années, les entreprises ont dû intégrer de nouvelles méthodes issues du digital au
-
Computer Science for Kids
Wiley 出版A kid-friendly and rigorous new way to teach young readers the fundamentals of computer science In
-
Impact of social networking sites on learning
Ingram 出版Social networking sites have had a significant impact on learning over the past decade. While there
-
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Intechopen 出版In the modern era of digitization, cryptographic techniques are becoming increasingly important. Th
-
Crypto techniques for secure data distribution
Self Publish 出版Cryptographic techniques are essential for secure data distribution, especially when sensitive info
-
Crypto stego protecting digital secrets
Self Publish 出版Crypto steganography (often simply called "stego") is a technique for concealing secret digital inf
-
Formalization of Knowledge Centric Paradigms for Diversification of Web Search Encompassing Semantic Artificial Intelligence
Owing to the current structure of the intermediate Web which is transforming from a conventional We
-
Performance Based Comparative Assessment of Different Security Tools for Web Application
Ingram 出版Technology has been progressively making a substantial positive influence on social life. If we see
-
-
Fault Diagnosis in Wireless Sensor Networks using Artificial Immune System
Ingram 出版: LUHOHVV VHQVRU QHWZRUNV:61V KDYH EHFRPH SRSXODU ZRUOGZLGH GXH WR WKHLU ZLGH UDQJH RI DSSOLFDWLRQV
-
Get Rich or Lie Trying
"Compelling." --Reni Eddo-Lodge, author, Why I'm No Longer Talking to White People About Race Disco
-
Amazon Web Services in Action, Third Edition
Master essential best practices for deploying and managing applications on Amazon Web Services. Thi
-
CellCluster
CellCluster is another alternative to the current techniques of data parallel processing, without i
-
-
The Intersection of Artificial and Multiple Intelligence
Ingram 出版The Intersection of Artificial and Multiple Intelligence" is an insightful book that provides a com
-
Machine Learning For Humans
Ingram 出版Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems
Ingram 出版With a business baseline focused on the impact of embedded systems in the years ahead, the book inv
-
-
How Social Media Shapes Tourist Preferences
Ingram 出版The purpose of the present study is to investigate the influence of contextual factors that predict
-
Mitigation of Load Balancing for Cloud Using Ant Colony Optimization
Ingram 出版This book contains the Introduction to Cloud computing, the services provided by the cloud and the
-
The Role of Social Media in IT and ITES Talent Acquisition
Tanvi Singh 出版The chapter aims to provide an introduction to the topic of the research and assessing the signific
-
Method for handling incidents in telecommunications systems
Currently, computer networks in the corporate environment have systems and equipment essential to t
-
Evading Edr
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the
-
Cross Platform Application Development
Ingram 出版Cross-platform applications are characterized by being created with a single programming language t
-
Deconstructing Socio-Political Dynamics
Social media's penetration was visible as most of the youth got attracted to forums like Facebook,
-
Behavior-based Authentication to Protect System Services From Malicious Attacks
Behavior-based authentication is a relatively new approach that has gained traction in recent years
-
A Study on the Social Media Marketing Strategies of Political Parties
Ingram 出版"A Study on the Social Media Marketing Strategies of Political Parties" by Shubham Saxena is a comp
-
Empowering the Next Generation
Ingram 出版A Democratic society is the one, where the citizens elect their representatives and give them the p
-
Concept Map Generation from Domain Text Using Machine Learning and Deep Learning Techniques
The generation of concept maps from domain text using machine learning and deep learning techniques
-
Password Logbook (Black & Gold)
Ingram 出版Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed noteb
-
A-Z Password Book
Ingram 出版This large-format, alphabetized password book is organized by tabs per letter, making it easy, fast
-
Managing the Buffer Overflow Attack in Network and Operating System Detecting and Preventing Techniques
A thorough manual that addresses buffer overflow assaults is "Managing the Buffer Overflow Attack i
-
Artificial Intelligence-Based Performance Evaluation of Routing in Manet
J. Rangaraj's comprehensive manual "Artificial Intelligence-Based Evaluation of Routing in MANET" a
-
A Framework for User Interface and User Experience of Web-Based Application
Ingram 出版Naveen Kumar's "A Framework for User Interface and User Experience of Web-Based Application" is a t
-
A Proactive Network Surveillance Framework
Network security paradigm should be the one that permeates the enterprise, including people, proces
-
Developing Web Components with Svelte
Apress 出版Leverage the power of Svelte to quickly produce the foundations of a framework-agnostic component l
-
Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media
Researchers developed the Racist and Violent Extremist Flock (RVE-Flock) tool to explore and analyz