-
Logging Out
Do you find yourself constantly scrolling through social media, comparing your life to others, and
-
Enhanced IDS using Hybrid Machine Learning Approach
The Enhanced Intrusion Detection System utilizing a Hybrid Machine Learning Approach is a security
-
-
Wireframing for Everyone
Ingram 出版Many UX techniques fall apart in the real world of overflowing backlogs, two-week sprints, and stub
-
Advanced Networking
Ad hoc network is a set up anywhere without any need for external infrastructure such as wires of b
-
Logging Out
Ingram 出版Do you find yourself constantly scrolling through social media, comparing your life to others, and
-
Packet Classification Method for Preventing Selective Jamming Attacks
In this book, we address the problem of selective jamming attacks in wireless networks. In these at
-
Efficient Wireless Sensor Network Protocol Using Two Level Clustering
Ingram 出版A wireless sensor network consists of an enormous number of sensor nodes. Every sensor node senses
-
Security of services hosted in the Cloud with Le WAF
Ingram 出版This study focuses on a new approach to outsourcing web application security, which is the distribu
-
X86 Software Reverse-Engineering, Cracking, and Counter-Measures
Wiley 出版A crystal-clear and practical blueprint to software disassembly x86 Software Reverse-Engineering, C
-
Black Hat Graphql
Ingram 出版Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vuln
-
Data Structure Lab Guideline
Data Structure is a branch of Computer Science. The study of data structure allows us to understand
-
Mastering Python Network Automation
Ingram 出版Numerous sample programs & examples demonstrating the application of python tools to streamline net
-
Contributions to the Study of Big Data Analytics
Ingram 出版This book explores the genetic adaptations of populations living in high altitude environments and
-
Networking Fundamentals
Ingram 出版This Lab Manual complements the Networking Fundamentals textbook and classroom-related studies. The
-
Efficient, backoff-based MAC protocols for RCSFs
Ingram 出版Just as in traditional wireless networks, Medium Access Control (MAC) in Wireless Sensor Networks (
-
Least Power Adaptive Hierarchy Cluster for Balancing Energy on WSN
Ingram 出版Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed in a larg
-
To Art Reflections of Mar穩a Eva Bocco Nieto
Ingram 出版Reflection 20221021 for Maria Eva Bocco Grandson of Maria Eva Bocco Grandson for years, DEC COMEBN
-
-
Reliable Internet of Things Communication and Service Discover
The Internet of Things is a many vision one paradigm technology thatconnects electrical, electronic
-
Optimized TCP Congestion Control Protocol
The objective of the Transmission Control Protocol (TCP) is toprovide reliable end-to-end delivery
-
DNA Cryptography Using Quantum Computing
Ingram 出版The prime concern in data communication over a transmission channelis the security of the data whic
-
15-Minute Focus: Digital Citizenship: Supporting Youth Navigating Technology in a Rapidly Changing World
Ingram 出版Are you looking for expert guidance and engaging tools to help students navigate their complex digi
-
Securing ChatGPT
"Securing ChatGPT: Best Practices for Protecting Sensitive Data in AI Language Models" is a must-re
-
Celebrity, Persuasion and Social Media
Ingram 出版A new type of celebrity known as a digital influencer has emerged due to the accelerated uptake of
-
An Efficient Vertical Handoff Decision Scheme
Ingram 出版The next generation wireless networks are expected to support different applications within a heter
-
Introduction To Cyber Forensics & Investigation
Ingram 出版In the civil and criminal justice systems, computer forensics helps ensure the integrity of digital
-
Modern Web Development with Go
Ingram 出版Build fast, scalable web server applications by harnessing the power of solution-driven programming
-
3D Reconstruction with Deep Learning
3D Reconstruction with Deep Learning" by Rocher is a comprehensive guide to the field of 3D reconst
-
Clear Light
The Singularity is not a union of flesh and machine. Rather, the Singularity is a union of mind to
-
Can digital technology impact the product strategy of companies?
Ingram 出版En quelques années, les entreprises ont dû intégrer de nouvelles méthodes i
-
Computer Science for Kids
Wiley 出版A kid-friendly and rigorous new way to teach young readers the fundamentals of computer science In
-
Impact of social networking sites on learning
Ingram 出版Social networking sites have had a significant impact on learning over the past decade. While there
-
Crypto stego protecting digital secrets
Self Publish 出版Crypto steganography (often simply called "stego") is a technique for concealing secret digital inf
-
Crypto techniques for secure data distribution
Self Publish 出版Cryptographic techniques are essential for secure data distribution, especially when sensitive info
-
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Intechopen 出版In the modern era of digitization, cryptographic techniques are becoming increasingly important. Th
-
Formalization of Knowledge Centric Paradigms for Diversification of Web Search Encompassing Semantic Artificial Intelligence
Owing to the current structure of the intermediate Web which is transforming from a conventional We
-
Fault Diagnosis in Wireless Sensor Networks using Artificial Immune System
Ingram 出版: LUHOHVV VHQVRU QHWZRUNV:61V KDYH EHFRPH SRSXODU ZRUOGZLGH GXH WR WKHLU ZLGH UDQJH RI DSSOLFDWLRQV
-
Performance Based Comparative Assessment of Different Security Tools for Web Application
Ingram 出版Technology has been progressively making a substantial positive influence on social life. If we see
-
Get Rich or Lie Trying
Ingram 出版"Compelling." --Reni Eddo-Lodge, author, Why I'm No Longer Talking to White People About Race Disco
-
Amazon Web Services in Action, Third Edition
Master essential best practices for deploying and managing applications on Amazon Web Services. Thi
-
CellCluster
CellCluster is another alternative to the current techniques of data parallel processing, without i
-
Navigating the Dark Waters of Cybersecurity Incident Response
Ingram 出版Welcome to "Navigating the Dark Waters of Cybersecurity Incident Response," a comprehensive guide t
-
The Intersection of Artificial and Multiple Intelligence
Ingram 出版The Intersection of Artificial and Multiple Intelligence" is an insightful book that provides a com
-
Machine Learning For Humans
Ingram 出版Machine Learning for Humans is an introduction to machine learning that is accessible to anyone wit
-
-
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems
Ingram 出版With a business baseline focused on the impact of embedded systems in the years ahead, the book inv
-
How Social Media Shapes Tourist Preferences
Ingram 出版The purpose of the present study is to investigate the influence of contextual factors that predict