-
Social media use among students effects on academic performance
Ingram 出版Social Media with its ubiquitous presence has become an almost indispensable part of our lives. Whi
-
Microsoft Azure for Dummies
For Dummies 出版The must-have reference for Azure newcomers As Microsoft's Azure platform takes a larger stake in t
-
Role of social media in creating a new youth
Ingram 出版Social media is social interaction among the people in which they create, share or exchange picture
-
-
Criptolog穩a Digital (Digital Cryptology)
Ingram 出版Las computadoras y el Internet cambiaron para siempre la forma en que comunicamos mensajes y otro t
-
The Security & Privacy Acceptance Framework (SPAF)
Ingram 出版Cybersecurity and Privacy (S&P) unlock the full potential of computing. Use of encryption, authenti
-
The Bell Jar
Ingram 出版ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challen
-
E-Voting Through Biometric Security System
Ingram 出版Assistant Professor, Dept: of Electronics and Communication Engineering, College of Engineering Per
-
Security Assurance by Efficient Password Based Authentication
Ingram 出版At present, identity theft is one of the most prevalent security threats.Authentication is an inevi
-
Mastering Apache Solr
Ingram 出版Topic: In the open source, full-text search community, a leader emerges - Apache Solr. Apache Solr
-
Improving the Security and Privacy of Edge Devices Through Blockchain
Ingram 出版The world of IoT existence is wholly being built on the communication and the interconnectionof thi
-
-
Rust Web Development
Ingram 出版Create bulletproof, high-performance web apps and servers with Rust. In Rust Web Development you wi
-
An Intelligent System for Exploration of Web User Behavior
Ingram 出版Advances in information technology extend the use of the Internet in various areas such ascommunica
-
Criptolog穩a Digital (Digital Cryptology)
Ingram 出版Las computadoras y el Internet cambiaron para siempre la forma en que comunicamos mensajes y otro t
-
Advances in Cyber Security and Intelligent Analytics
Ingram 出版We live in a digital world, where we use digital tools and smart devices to communicate over the In
-
Computer Security. Esorics 2022 International Workshops
Springer 出版This book constitutes the refereed proceedings of seven International Workshops which were held in
-
Efficient routing and storage management in intermittently connected mobile networks
INTRODUCTIONThe portable and handy communication devices existing in thepresent day provide more co
-
Fixing American Cybersecurity
Ingram 出版Advocates a cybersecurity "social contract" between government and business in seven key economic s
-
Detection of Opinion Spam in Online Social Media
Ingram 出版With the rise of social media, people started sharing opinions or experiences, exchanging ideas, pr
-
Logged Off
Ingram 出版WELCOME TO THE SECOND EDITION!How many likes did you receive on your last post?Are you satisfied wi
-
Wireless Penetration Testing
Ingram 出版Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES &
-
Proofs, Arguments, and Zero-Knowledge
Ingram 出版This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called inte
-
Pricing Design
Ingram 出版Pricing projects can feel tricky, but it doesn't have to be. Dan Mall explains how to earn more, by
-
Cultivating Content Design
Ingram 出版Great content doesn't happen in a vacuum. It gets bogged down in teams, organizations, silos, and p
-
Practical Pair Programming
Ingram 出版Two heads are better than one, especially when it comes to large, mission-critical software project
-
Wordpress in Easy Steps
This popular guide toWordPress shows you how to create websites without having to learn coding, and
-
Get Ready for CSS Grid Layout
Ingram 出版By the time CSS Grid Layout was supported by all major browsers in 2017, Rachel Andrew had already
-
Blockchains
Springer 出版This book takes readers through the sensational history of blockchains and their potential to revol
-
Personalized Ranking for Search Engines Based on Web Usage Analysis
Ingram 出版The introduction of high-speed internet and the rise in smart phone internet users has resulted in
-
Medical Image Security
Ingram 出版At the present time, surviving without access to the digital information media using various types
-
Telecommunication Business Information System & Investment Ecosystem
Ingram 出版ICT in Nigeria is currently administered under the National ICT Policy issued by the Ministry of Co
-
Internet of things (IoT) Security
Internet of security in IoT is the act of securing Internet devices and the networks they're connec
-
The control of the archives
Ingram 出版Mastery of archives: a necessity for the effective and efficient management of Single Window for Bu
-
A Novel Approach for Personalized Bigdata Security System
Ingram 出版In this technological advanced and digitalization era, there are many number of organizationsfacing
-
Lightweight Secure Network Coding for Security and Privacy of Smart Sensor Objects
Ingram 出版Network coding existed for a very long time. It provides efficient techniques to enhance the effici
-
Instagram for Dummies
For Dummies 出版Are you on Insta? Start sharing pictures and a lot, lot more Instagram For Dummies helps you naviga
-
Comprehensive Hypertext Markup Language (HTML).
Blurb 出版This course is intended for aspiring web designers and developers who need to comprehend HTML thoro
-
Working the Command Line
Book Apart 出版Don't fear the terminal. No, really. However you've wound up face-to-face with the cool glow of a t
-
Strengthening the Eu’s Cyber Defence Capabilities
Cyber defence is critical to both the EU's prosperity and security. Yet, the threat space it faces
-
Image Performance
Book Apart 出版To solve the most critical performance problems with the biggest impact, start with images. Respons
-
How does AI impact the organizational identity in client-focused investment advisory?
Ingram 出版Seminar paper from the year 2021 in the subject Computer Sciences - Artificial Intelligence, grade:
-
Practical Cyber Threat Intelligence
Knowing your threat actors together with your weaknesses and the technology will master your defens
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
Ingram 出版This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling
-
Study of Internet Use and Its Related Variables Among Teenagers
The Internet plays a crucial role in the day-to-day lives of the current generation, making things
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests
Ingram 出版The only official CCSP practice test product endorsed by (ISC)2 With over 850 practice questions al
-
Self-Publish with Me
Ingram 出版No matter what type of writer you are or genre of book you write, books flying off bookstore shelve
-
Blockchain and Trustworthy Systems
Springer 出版This book constitutes the thoroughly refereed post conference papers of the 4th International Confe