-
Logged Off
Ingram 出版WELCOME TO THE SECOND EDITION! How many likes did you receive on your last post? Are you satisfied
-
Proofs, Arguments, and Zero-Knowledge
Ingram 出版This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called inte
-
Wireless Penetration Testing
Ingram 出版Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES &
-
Pricing Design
Ingram 出版Pricing projects can feel tricky, but it doesn't have to be. Dan Mall explains how to earn more, by
-
Cultivating Content Design
Ingram 出版Great content doesn't happen in a vacuum. It gets bogged down in teams, organizations, silos, and p
-
-
Wordpress in Easy Steps
This popular guide to WordPress shows you how to create websites without having to learn coding, a
-
Get Ready for CSS Grid Layout
Ingram 出版By the time CSS Grid Layout was supported by all major browsers in 2017, Rachel Andrew had already
-
Blockchains
Springer 出版This book takes readers through the sensational history of blockchains and their potential to revol
-
Personalized Ranking for Search Engines Based on Web Usage Analysis
Ingram 出版The introduction of high-speed internet and the rise in smart phone internet users has resulted in
-
Medical Image Security
Ingram 出版At the present time, surviving without access to the digital information media using various types
-
Telecommunication Business Information System & Investment Ecosystem
Ingram 出版ICT in Nigeria is currently administered under the National ICT Policy issued by the Ministry of Co
-
A Novel Approach for Personalized Bigdata Security System
Ingram 出版In this technological advanced and digitalization era, there are many number of organizationsfacing
-
Internet of things (IoT) Security
Internet of security in IoT is the act of securing Internet devices and the networks they're connec
-
The control of the archives
Ingram 出版Mastery of archives: a necessity for the effective and efficient management of Single Window for Bu
-
Lightweight Secure Network Coding for Security and Privacy of Smart Sensor Objects
Ingram 出版Network coding existed for a very long time. It provides efficient techniques to enhance the effici
-
Instagram for Dummies
For Dummies 出版Are you on Insta? Start sharing pictures and a lot, lot more Instagram For Dummies helps you naviga
-
Comprehensive Hypertext Markup Language (HTML).
Blurb 出版This course is intended for aspiring web designers and developers who need to comprehend HTML thoro
-
Working the Command Line
Book Apart 出版Don't fear the terminal. No, really. However you've wound up face-to-face with the cool glow of a t
-
Strengthening the Eu’s Cyber Defence Capabilities
Cyber defence is critical to both the EU's prosperity and security. Yet, the threat space it faces
-
-
How does AI impact the organizational identity in client-focused investment advisory?
Ingram 出版Seminar paper from the year 2021 in the subject Computer Sciences - Artificial Intelligence, grade:
-
Practical Cyber Threat Intelligence
Knowing your threat actors together with your weaknesses and the technology will master your defens
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
Ingram 出版This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling
-
Study of Internet Use and Its Related Variables Among Teenagers
The Internet plays a crucial role in the day-to-day lives of the current generation, making things
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests
Ingram 出版The only official CCSP practice test product endorsed by (ISC)2 With over 850 practice questions al
-
Self-Publish with Me
Ingram 出版No matter what type of writer you are or genre of book you write, books flying off bookstore shelv
-
-
Techniques for Secure Transmission
Crypto has a long and exciting history. most do not complete technical description of Kahn of the m
-
-
MCA Microsoft Certified Associate Azure Network Engineer Study Guide
Ingram 出版Prepare to take the NEW Exam AZ-700 with confidence and launch your career as an Azure Network Engi
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide
Ingram 出版The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP
-
Big Data and Social Computing
Springer 出版This book constitutes refereed proceedings of the 7th China National Conference on Big Data and Soc
-
Robotics, Computer Vision and Intelligent Systems
Springer 出版This volume constitutes the papers of two workshops which were held in conjunctionwith the First In
-
The Cloud in Iot-Enabled Spaces
Ingram 出版The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions propos
-
-
-
-
-
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, th
-
Modern Cybersecurity Strategies for Enterprises
Ingram 出版Security is a shared responsibility, and we must all own it KEY FEATURES ● Expert-led instructio
-
Learning Salesforce Development with Apex
Ingram 出版Learn to harness the power of the Apex language to build Salesforce applications DESCRIPTION Acqu
-
Data for All
Gain in-depth knowledge about how companies manipulate and exploit personal data. A book that does
-
Defending Cyber Systems Through Reverse Engineering of Criminal Malware
Springer 出版Introduction to The Fascinating World of Malware Analysis.- Static Analysis of Malware.- Behavioral
-
Secure Multi-Party Computation Against Passive Adversaries
Springer 出版This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also
-