-
-
Test-Driven Development with React
Apress 出版Learn to use accelerated test-driven development (TDD) to build a React application from scratch. T
-
Procuring Adhoc Networks from Black Hole Attacks
MANETs are in-secure and vulnerable to attacks as it lacks a central trusted authority. Providing s
-
-
ISO 27001 Handbook
This book helps you to bring the information security of your organization to the right level by us
-
Computer Network (LAN & WAN) Design and Domain Controller Configurations
Husnifazeel 出版This book consist of sample Computer Network (whole LAN & WAN) design and Primary Child Domain Cont
-
Podcasting for beginners
55% OFF for Bookstores! Find out the final price!Would you like to create your own podcast but you
-
Apprentice Blogger
Have you heard other people talking on and on about their "blogs" while all you could do was smile
-
Hacking With Kali Linux
Ingram 出版Are you fascinated by the idea of hacking?Do you want to learn the secrets of ethical hackers?This
-
Javascript
Would you like to join today's world and understand the specifics of one of the most popular progra
-
Kubernetes
Would you like to have all in one portable, extensible, open-source platform for managing your cont
-
-
Kali Linux Hacking
Everooks Ltd 出版Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamenta
-
Employment of Transmission Control Protocol over Simulation Platform
This book presents the architecture, fundamentals and analysed the functional structure of Transmis
-
Employment of Transmission Control Protocol over Simulation Tools
This book presents the architecture, fundamentals and analysed the functional structure of Transmis
-
Click fraud
Online search advertising is currently the greatest source of revenue for many Internet giants such
-
Information Security Management of University Libraries
Information systems in university libraries support the delivery of images, scholarly communication
-
Shuffle Exchange Multistage Interconnection Network
Multistage Interconnection Networks offer an economical solution to communication and interconnecti
-
Security & Reliability in Embedded Systems
This work is about a bold step towards bringing proven security to embedded systems. Most present d
-
SAP S/4hana Cloud
SAP Press 出版New to SAP S/4HANA Cloud? This is the book for you! Get detailed descriptions and screenshots to se
-
Anomaly Detection System for Network Traffic using Data Mining
Anomaly detection using Density Maximization Fuzzy C-means Algorithm: The rationale for the anomaly
-
Improvement of Effective Architectures for Discrete Wavelet Transform
Focusing on the intensive computations involved in the discrete wavelet transform (DWT), the design
-
Reconfigurable wireless communication networks
Mobile Ad hoc Networks (MANETs) are dynamic in nature. Due to this, design of an efficient routing
-
Weighted Dominating Set Algorithms for Wireless Sensor Networks
Dominating set is one of the graph theoretical structures and has many important applications such
-
How to Make Money Using Blogs
Mark Keith 出版**55% OFF for Bookstores!! LAST DAYS***HOW TO MAKE MONEY USING BLOGSYour Customers Never Stop to Us
-
How to Make Money Using Blogs
Mark Keith 出版**55% OFF for Bookstores!! LAST DAYS***HOW TO MAKE MONEY USING BLOGSYour Customers Never Stop to Us
-
-
Copywriting
Philip Hayes 出版Have You Wondered to persuade customers through Content Marketing? Are You Looking for a Revolution
-
Copywriting
Philip Hayes 出版Have You Wondered to persuade customers through Content Marketing? Are You Looking for a Revolution
-
How to Make Money Using Blogs
Mark Keith 出版**55% OFF for Bookstores!! LAST DAYS***HOW TO MAKE MONEY USING BLOGSYour Customers Never Stop to Us
-
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th
-
Modern CSS with Tailwind
Tailwind CSS is an exciting new CSS framework that allows you to design your site by composing simp
-
Emotional Intelligence
In reality of the global pandemic quarantine, the ability to manage emotions (emotional intelligenc
-
A novel BBICR Technique in Vehicular Ad-hoc Networks
Vehicular impromptu system is rising as another scene of portable specially appointed systems, aim
-
The Cybersecurity Path
Wiley 出版Land the perfect cybersecurity role--and move up the ladder--with this insightful resource Finding
-
Agenda Planner del Blogger
Blurb 出版12 mesi e 350 pagine giornaliere. Contenuto: -Dati personali; -Calendario annuale; -5 pagine per pr
-
【電子書】星軺東來:記美駐華十位大使及一位特使
聯經 出版本書為前駐美大使沈劍虹夫人魏惟儀女士,跟隨沈大使外交生涯數十年,和美國駐華大使特使,及其夫人們之間的互動,所做的紀錄。 這些大使們的生平、個性、家庭、生活、喜好等等,一般人無法窺見,沈夫人觀察
-
星軺東來:記美駐華十位大使及一位特使
聯經 出版本書為前駐美大使沈劍虹夫人魏惟儀女士,跟隨沈大使外交生涯數十年,和美國駐華大使特使,及其夫人們之間的互動,所做的紀錄。 這些大使們的生平、個性、家庭、生活、喜好等等,一般人無法窺見,沈夫人觀察
-
Digital Forensics, Investigation, and Response
Ingram 出版Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals
-
Social Media Data Analysis
Social networks have become very popular in recent years because of the increasing proliferation an
-
Cyberjutsu
Ingram 出版Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundati
-
Performance Enrichment of Unicast Routing Protocol
Nodes inside the corresponding broadcast range are supposed to communicate explicitly on wireless n
-
Semantic Relations Between Nominals
Opportunity and Curiosity find similar rocks on Mars. One can generally understand this statement i
-
Academic Research on the Internet
CRC Press 出版Find what you're looking for with the best Internet resources for academic research in the humaniti
-
Performance Study Of Security Mechanismsm For Mobile Agent Domain
Mobile agents are preponderating the internet technology that actually were part of / are software
-
Building in Security at Agile Speed
Ingram 出版Today's high-speed and rapidly changing development environments demand equally high-speed security
-
Secure communication in p2p networks
Increased security does not provide comfort to paranoid people. Security with some very basic prote