-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND
-
Computer Networking
Ingram 出版If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AN
-
Supercharging Node.js Applications with Sequelize
Packt 出版A hands-on implementation guide to application development in Node.js using the powerful Sequelize
-
Applied Intelligence and Informatics
Springer 出版This book constitutes the refereed proceedings of the Second International Conference on Applied In
-
Network Automation with Go
Packt 出版Understand the world of modern network automation with Go and deepen your knowledge with insights f
-
Cloud Identity Patterns and Strategies
Packt 出版Get to grips with identity patterns and design a structured enterprise identity model for cloud app
-
React Application Architecture for Production
Packt 出版A hands-on guide to help you develop skills and confidence in building and structuring React applic
-
Winning the National Security AI Competition
Apress 出版In introducing the National Security Commission on AI's final report, Eric Schmidt, former Google C
-
PCI Compliance
Ingram 出版The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is conti
-
Silicon Valley Cybersecurity Conference
Springer 出版This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cy
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Machine Learning, Image Processing, Network Security and Data Sciences
Springer 出版This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International
-
Mathematical Modeling and Supercomputer Technologies
Springer 出版This book constitutes selected and revised papers from the 22nd International Conference on Mathema
-
Network Programming with Linux
Ingram 出版To construct today's distributed, network applications and services, you really want profound domin
-
The Magic Visual
Lulu.com 出版Making images will help you get noticed in any medium. The Magic Visual will teach you the how and
-
Secret Admirer
Ingram 出版This book will explain the origins and details of the 'parasocial relationship.'
-
Advancements in Interdisciplinary Research
Springer 出版This volume constitutes selected and revised papers presented at the First International Conference
-
High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on High-Perform
-
An Ethical Guide to Cyber Anonymity
Packt 出版Dive into privacy, security, and online anonymity to safeguard your identityKey Features: Leverage
-
Practical Highcharts with Angular
Apress 出版Learn to create stunning animated and interactive charts using Highcharts and Angular. This updated
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Animation at Work
Ingram 出版Animation isn't merely decorative-it's an invaluable tool for creating a better web. Start with sci
-
High-Performance Web Apps with Fastapi
Apress 出版Build APIs and web apps based on Asynchronous Server Gateway Interface (ASGI). This book provides a
-
Data Duped
Ingram 出版We are commonly deceived by numbers and data in our everyday lives. From lotteries, product warrant
-
Digital Forensics and Incident Response - Third Edition
Packt 出版Build your organization's cyber defense system by effectively applying digital forensics, incident
-
Modern Frontend Development with Node.js
Packt 出版Enhance your web development projects by fully leveraging Node.js concepts, tools, and best practic
-
An Event-Driven Parallel-Processing Subsystem for Energy-Efficient Mobile Medical Instrumentation
Ingram 出版Aging population and the thereby ever-rising cost of health services call for novel and innovative
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Machine Learning for Cyber Security
Springer 出版The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of
-
Machine Learning and Principles and Practice of Knowledge Discovery in Databases
Springer 出版This volume constitutes the papers of several workshops which were held in conjunction with the Int
-
Cryptography, Codes and Cyber Security
Springer 出版This book constitutes the refereed First International Conference on Cryptography, Codes and Cyber
-
Iso/Iec 27001:2022
Ingram 出版Written by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 - An Introduction to In
-
Blockchain - Icbc 2022
Springer 出版This book constitutes the proceedings of the 5th International Conference on Blockchain, ICBC 2022,
-
Internet of Things - Iciot 2022
Springer 出版This book constitutes the proceedings of the 7th International Conference on Internet of Things, IC
-
Cognitive Computing - ICCC 2022
Springer 出版This book constitutes the proceedings of the International Conference on Cognitive Computing, ICCC
-
Emerging Information Security and Applications
Springer 出版This volume constitutes selected papers presented at the Third International Symposium on Emerging
-
The Small Business Owner's Guide to Protecting Your Business From Hackers
Ingram 出版As cybercrime continues to rise at an alarming rate, it is now more important than ever to ensure t
-
The Cyber Security Handbook
Ingram 出版In the world as we know it, you can be attacked both physically and virtually. For today's organisa
-
High Performance Computing. Isc High Performance 2022 International Workshops
Springer 出版This book constitutes the refereed conference proceedings of the workshops held at the 37th Interna
-
Imaginary Advice
Lulu.com 出版Lined creative writing journal. Contains one-hundred writing prompts. From author Ross Sutherland,
-
Network Design Cookbook
Lulu.com 出版Version 10.2.8 (August 2016) The Network Design Cookbook is a guide that provides a structured proc
-
Trusted Computing Platforms
Springer 出版Trusted Computing Platforms: Design and Applications is written for security architects, applicatio
-
Cyber Operations
Wiley 出版Cyber Operations A rigorous new framework for understanding the world of the future Information t
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Advances in Cryptology - Asiacrypt 2022
Springer 出版The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 2
-
Progress in Cryptology - Indocrypt 2022
Springer 出版The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYP