-
Essentials of Cloud Computing
Springer 出版Numerous advancements are being brought in and incorporated into the cloud domain with the aim of r
-
Detection for Software Defined Networking with Machine Learning
Ingram 出版As the use of Software Defined Networking (SDN) becomes increasingly prevalent, securing these dyna
-
Discriminatory Content in Social Web
Ingram 出版The rapid growth of web technology and social networks has facilitated contact between people from
-
Machine Learning For Humans (6 x 9)
Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
The Active Defender
Wiley 出版Immerse yourself in the offensive security mindset to better defend against attacks In The Active D
-
-
-
Discovering Internet
The words you provided shed light on a truth we all know deep down-the ever-increasing importance a
-
-
Software Agents Based Web Data Mining
Ingram 出版Software Agents Based Web Data Mining: An Intelligent Approach is the topic of research. Web data m
-
The Peep and Squeak Password Assistance Book
Tagger Press 出版With enough space to record usernames, passwords, and security questions, this book will help you k
-
Coercion - Resistant and Verifiable E-Voting System
A coercion-resistant and verifiable e-voting system is a sophisticated electronic voting system des
-
The Peep & Squeak Easy-to-Read Password Assistance Book
Tagger Press 出版An easy-to-read large font book to store passwords and other important information that is importan
-
Online Social Networks with Computational Intelligence
Ingram 出版The focuses on understanding the concept of opinion leaders within online social networks, employin
-
understanding google
Ingram 出版This thesis explores the impact of search engines within contemporary digital culture and, in parti
-
Contagion Source Detection in Epidemic and Infodemic Outbreaks
Ingram 出版The rapid spread of infectious diseases and online rumors share similarities in terms of their spee
-
Bootstrapping Microservices, Second Edition
Build a microservices application from scratch using industry standard tools and battle-tested best
-
Tiny CSS Projects
Explore numerous techniques to improve the way you write CSS as you build 12 tiny projects. For rea
-
Building in Security at Agile Speed
Ingram 出版Today's high-speed and rapidly changing development environments demand equally high-speed security
-
Gradient Expectations
Mit Press 出版An insightful investigation into the mechanisms underlying the predictive functions of neural netwo
-
Jeff Duntemann’s Drive-By Wi-Fi Guide
Provides everything Wi-Fi users need to know to design, build, protect, and extend a Wi-Fi wireless
-
Dreamweaver 4 F/X and Design
Dreamweaver? 4 f/x and Design improves, enriches, and builds upon the reader's current Dreamweaver
-
ASP.NET 2.0 Black Book
The ASP.Net 2.0 Black Book features immediate solutions that provide hands-on real-world techniques
-
Cisco Network Security Little Black Book
With this concise, problem-solving guide you will learn how to identify network security threats an
-
Dreamweaver 8: The Missing Manual
Available for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and
-
Dreamweaver Cs3: The Missing Manual
Ingram 出版Welcome to Dreamweaver CS3. This new version of the popular web design software offers a rich envir
-
Dreamweaver 4 Visual Insight
Readers will learn how to convert text files to Web pages, add/edit Web pages images, make global c
-
SAP Access Control
Ingram 出版Manage on-premise user access with this comprehensive guide to SAP Access Control. Begin with step-
-
Securing the Internet of Things Environment against RPL Attacks
Self Publish 出版Kevin Ashton first coined the term Internet of Things in his presentation on automating the supplyc
-
Outrage Machine
Legacy Lit 出版Amazon's Best History Book of the Month for July 2023 An invaluable guide to understanding how the
-
Internet access problems
Mobile telephony and the Internet reign supreme in the communications landscape in every corner of
-
Professional Security Management
Routledge 出版Historically, security managers have tended to be sourced from either the armed forces or law enfor
-
瞄準十八大:中共第五代領導菁英
博雅書屋 出版在2012年下半年,中共將舉行第十八次全國黨代表大會。現任九位政治局常委當中,有七人將在十八大屆齡退休。這意味著中共高層將面臨一次新的洗牌,中共第四代領導人將退出權力中心,第五代領導人走向台前。誰將
-
-
Wordpress All-In-One for Dummies
For Dummies 出版The no-nonsense guide to building your own WordPress site With the help of WordPress All-in-One For
-
-
The Dark Cloud
Scribe Us 出版A gripping new investigation into the underbelly of digital technology, which reveals not only how
-
The study is titled ”SELF-TEL ARCHITECTURE BASED FAULT IDENTIFICATION AND DELAY AWARE DATA MANAGEMENT FOR IOT MOBILE EDGE ENVIRONMENT
Ingram 出版The Internet of Things (IoT) enables autonomous, predictive, and real-time sensing and monitoring o
-
Towards Design and Development of Secure and Privacy-Preserving Frameworks for IOT-enabled Networks
With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is buil
-
Perception of Cyber Security
This book extends the presentation of overview of the cyber security today, its common perception t
-
Improving Lifetime Of WSN Using Bio-Inspired Flower Pollination
The Internet of Things is a evolving network linking the physical world with the cyber world. Every
-
In-Band Full-Duplex Radios in 6G Networks
Ingram 出版Sixth-generation (6G) wireless communication networks will transform connected things in 5G into co
-
中共「十八大」政治繼承:持續、變遷與挑戰
印刻 出版中共將於2012年秋冬之際,召開五年一度的「十八大」。這次會議的重點在於:政治繼承與權力交班,因此政治權力核心成員的甄補、派系與權力鬥爭的運作和妥協,以及政策發展取向與變遷,皆是海內外關注的焦點。本
-
Multicast Authentication Scheme for Energy Conservation
Ingram 出版Conventional methods used in batch signature verification not distinguished between static node sig
-
Concise Encyclopedia of Coding Theory
Ingram 出版Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematic
-
Sister Nivedita Exploring Social And Political Ideals
Sister Nivedita: Exploring Social and Political IdealsSister Nivedita, born Margaret Elizabeth Nobl
-
Democracy In The Age Of Social Media
Democracy in the Age of Social MediaThe emergence and widespread use of social media have transform
-
Honeynetcloud Investigation Model for IoT Forensics
Cyber Forensics, the science of cyber-criminal investigation to detect the nature and type of crime