-
Ranking for Web Data Search Using On-The-Fly Data Integration
Ingram 出版Ranking - the algorithmic decision on how relevant an information artifact is for a given informati
-
Information Security and Cryptology - Icisc 2021
Springer 出版This book constitutes selected papers from the 24th International Conference on Information Securit
-
The Online World, What You Think You Know and What You Don't
Ingram 出版Every Child Who Has Access to a Smartphone, Tablet, Computer, or Video Games is at Risk!But NOW You
-
Advancing Computational Intelligence Techniques for Security Systems Design
Ingram 出版Security systems have become an integral part of the building and large complex setups, and interve
-
Secure and Efficient IP Mobility Support for Aeronautical Communications
Ingram 出版Motivated by the future Internet Protocol (IP) based aeronautical telecommunications network suppor
-
Flexible Application-Layer Multicast in Heterogeneous Networks
This work develops a set of peer-to-peer-based protocols and extensions in order to provide Interne
-
Hybrid routing in delay tolerant networks
Ingram 出版This work addresses the integration of today's infrastructure-based networks with infrastructure-le
-
Inter-Vehicle Communication at Intersections
This book evaluates the ability of ad-hoc and cellular communication to enable cross-traffic assist
-
Viral Marketing
Ingram 出版Viral marketing is word of mouth marketing taken to a whole new level. Viral marketing is so-called
-
The impact of inter-vehicle communication on vehicular traffic
Ingram 出版The work addresses communication networks established over radio equipped vehicles in our everyday
-
Advanced Signaling Support for IP-based Networks
Ingram 出版This work develops a set of advanced signaling concepts for IP-based networks. It proposes a design
-
Organic Service-Level Management in Service-Oriented Environments
Ingram 出版Dynamic service-oriented environments (SOEs) are characterised by a large number of heterogeneous s
-
Personalized Privacy Protection in Big Data
Springer 出版This book presents the data privacy protection which has been extensively applied in our current er
-
Security as Code
Ingram 出版DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cl
-
Once More Unto the Breach
Ingram 出版The challenges you face as an information security manager (ISM) have increased enormously since th
-
A Concise Introduction to the NIS Directive
Ingram 出版This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network an
-
Selling Information Security to the Board
Ingram 出版Information technology plays a fundamental role in the operations of any modern business. While the
-
Information Security a Practical Guide
Ingram 出版How do you engage with your peers when they think you're there to stop them working? Corporate info
-
Governance and Internal Controls for Cutting Edge It
To remain competitive we rely on being early adopters of new technologies - but there are inherent
-
The Art of Cyber Security
Ingram 出版This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber securi
-
Assessing Information Security
Ingram 出版The activities of the cyber criminal are both deliberate and hostile, and they can be compared to m
-
Practical Mathematical Cryptography
Ingram 出版This book provides a clear and accessible introduction to practical mathematical cryptography. The
-
Coordinating Service Compositions
Ingram 出版Electronic documents frequently include contributions from different human and non-human sources. T
-
Nine Steps to Success: An ISO 27001 Implementation Overview
Ingram 出版Step-by-step guidance on a successful ISO 27001 implementation from an industry leaderResilience ag
-
Managing Information Security Breaches
Ingram 出版The book provides a general discussion and education about information security breaches, how they
-
Lessons Learned: Critical Information Infrastructure Protection
Ingram 出版Understand how to protect your critical information infrastructure (CII). Billions of people use th
-
Digital Earth
Ingram 出版An accessible introduction to the most prevalent cyber threats in our current climate, this book di
-
Dimensions of Uncertainty in Communication Engineering
Ingram 出版Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introd
-
Entropy Randomization in Machine Learning
Ingram 出版Entropy Randomization in Machine Learning presents a new approach to machine learning-entropy rando
-
-
Socio-Technical Aspects in Security
Springer 出版This book constitutes revised selected papers from the refereed conference proceedings of the 11th
-
Theoretical Cybersecurity
Apress 出版There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to sa
-
Data and Applications Security and Privacy XXXVI
Springer 出版This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data a
-
-
-
Ansible: Up and Running
Ingram 出版Among the many configuration management tools available, Ansible has some distinct advantages: It's
-
Senaya Dictionary
Lulu.com 出版The Chaldean language of Sanandaj Christians has been forgotten over time, but recently the new gen
-
Listenable
Ingram 出版Listenable provides a simple content and delivery system from an internationally syndicated radio h
-
Good Listen
Ingram 出版Axiom Business Book Awards Bronze Medal Winner in Networking The Secrets Behind Creating Compelling
-
-
Podcasting - The Companion Handbook
Ingram 出版Podcasting-The Companion Handbook: A Guide to Producing and Publishing Your Podcast is a reference
-
Advances in Digital Forensics XVIII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Quantum Communication, Quantum Networks, and Quantum Sensing
Ingram 出版Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introducti
-
Data Analytics for Cybersecurity
Ingram 出版As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats.
-
Security Risk Models for Cyber Insurance
Ingram 出版Cyber attacks are rapidly increasing in sophistication and magnitude. The last few years having see
-
-
Learn Wireshark - Second Edition
Packt 出版Expertly analyze common protocols such as TCP, IP, and ICMP, along with learning how to use display
-
Hack the Cybersecurity Interview
Packt 出版Get your dream job and set off on the right path to achieving success in the cybersecurity field wi