-
-
Techniques for Secure Transmission
Crypto has a long and exciting history. most do not complete technical description of Kahn of the m
-
-
MCA Microsoft Certified Associate Azure Network Engineer Study Guide
Ingram 出版Prepare to take the NEW Exam AZ-700 with confidence and launch your career as an Azure Network Engi
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide
Ingram 出版The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP
-
Robotics, Computer Vision and Intelligent Systems
Springer 出版This volume constitutes the papers of two workshops which were held in conjunctionwith the First In
-
Big Data and Social Computing
Springer 出版This book constitutes refereed proceedings of the 7th China National Conference on Big Data and Soc
-
The Cloud in Iot-Enabled Spaces
Ingram 出版The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions propos
-
-
-
-
-
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, th
-
Learning Salesforce Development with Apex
Ingram 出版Learn to harness the power of the Apex language to build Salesforce applications DESCRIPTIONAcquiri
-
Modern Cybersecurity Strategies for Enterprises
Ingram 出版Security is a shared responsibility, and we must all own it KEY FEATURES ● Expert-led instruc
-
Data for All
Gain in-depth knowledge about how companies manipulate and exploit personal data. A book that does
-
Secure Multi-Party Computation Against Passive Adversaries
Springer 出版This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also
-
Defending Cyber Systems Through Reverse Engineering of Criminal Malware
Springer 出版Introduction to The Fascinating World of Malware Analysis.- Static Analysis of Malware.- Behavioral
-
-
Web Application Development with Streamlit
Apress 出版Transition from a back-end developer to a full-stack developer with knowledge of all the dimensions
-
Safety and Security of Cyber-Physical Systems
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with e
-
Build a Personal Brand and Find the Right Niche
Max Alices 出版Do you want to know how to build your personal brand on social media? Your customers will never sto
-
-
Blockchain Security from the Bottom Up
Wiley 出版The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the
-
Ethical Hacking: Techniques, Tools, and Countermeasures
Ingram 出版Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategie
-
Internet and Web Application Security
Ingram 出版Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mob
-
Secret Key Cryptography
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical met
-
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Wiley 出版The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles,
-
Networks Rising
Ingram 出版For the second time in human history, we are on the verge of broad new breakthroughs in health, pro
-
Linux Fundamentals
The Linux world is constantly changing, requiring new knowledge and skills to work as a Linux syste
-
Cybersecurity Essentials
About the BookIf you need to read only one book to acquire a strong foundation in cybersecurity fun
-
Briefs Anthology Volume 3
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 1
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 2
Ingram 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
The Weakest Link
Mit Press 出版An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and ac
-
Security Engineering for Embedded and Cyber-Physical Systems
CRC Press 出版Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at
-
Exploration of Novel Intelligent Optimization Algorithms
Springer 出版This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, hel
-
Assured Autonomy Survey
Autonomous systems will soon be ubiquitous in our society, saving us time, performing tasks we do n
-
Web Search Engines With Particular Reference
There are many search engines that facilitate information retrieval from the World Wide Web. Howeve
-
-
Executive’s Guide to Cyber Risk
Wiley 出版A solid, non-technical foundation to help executives and board members understand cyber risk In the
-
If It’s Smart, It’s Vulnerable
Wiley 出版Reimagine the future of the internet All our devices and gadgets--from our refrigerators to our hom
-
Two-Factor Authentication
Ingram 出版Passwords are not enough A password is a single authentication factor - anyone who has it can use i
-
Information Security Breaches
This pocket guide provides a general discussion of what information security breaches are, how they
-
Fundamentals of Information Systems Security with Navigate Testprep
Navigate TestPrep for Fundamentals of Information Systems Security, Fourth Edition is a digital-onl
-
Navigate Testprep for Fundamentals of Information Systems Security with Cloud Labs
Navigate TestPrep for Fundamentals of Information Systems Security, Fourth Edition is a digital-onl