-
Principles of Blockchain Systems
This book is the first to present the state of the art and provide technical focus on the latest ad
-
The Ransomware Handbook
Ingram 出版The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks.
-
Routing multipercorso con algoritmi di flusso massimo per il traffico Internet
Questa ricerca presenta un nuovo protocollo multipath che calcola percorsi multipli in una rete se
-
Routage ? trajets multiples utilisant des algorithmes de d矇bit maximal pour le trafic Internet
Cette recherche pr矇sente un nouveau protocole de trajets multiples qui calcule les trajets multiple
-
Mehrweg-Routing mit Max-Flow-Algorithmen f羹r Internet-Verkehr
In dieser Forschungsarbeit wird ein neues Multipath-Protokoll vorgestellt, das mehrere Pfade in ein
-
Routing wielościeżkowy z wykorzystaniem algorytm籀w Max Flow dla ruchu internetowego
W pracy przedstawiono nowy protok籀l wielościeżkowy, kt籀ry oblicza wiele ścieżek
-
Roteamento Multi-Percurso Usando Algoritmos de Fluxo M獺ximo Para Tr獺fego na Internet
Esta investiga癟瓊o apresenta um novo protocolo multicaminhos que calcula m繳ltiplos caminhos numa red
-
L’Internet des objets
L'internet des objets (IOT) et sa s矇curit矇 jouent un r繫le important dans l'癡re moderne de l'informa
-
Internet der Dinge
Das Internet der Dinge (IOT) und seine Sicherheit spielen eine wichtige Rolle in der modernen ?ra d
-
Tiktok Boom
TikTok is the fastest growing app in the world, and the first to challenge Silicon Valley's dominan
-
Characterization of Cooperative Node Communications for Improved MANET
This work is motivated by the fact that a selfish replica allocation could lead to overall poor MAN
-
The Easiest Computer Networking Guide
David Braun 出版**55% OFF for Bookstores!! LAST DAYS***The Easiest Computer Networking GuideYour Customers Never St
-
The Easiest Computer Networking Guide
David Braun 出版**55% OFF for Bookstores!! LAST DAYS***The Easiest Computer Networking GuideYour Customers Never St
-
Healthcare Cybersecurity
Maintaining cybersecurity in today's technologically driven world is vital to the health of any bus
-
How to Blog for Profit
55% OFF for BookStores! Discounted Retail Price NOW! Do you want to make money online and work from
-
Principles of Computer Security: Comptia Security+ and Beyond Lab Manual (Exam Sy0-601)
Practice the Skills Essential for a Successful Career in Cybersecurity!This hands-on guide contains
-
The 60-Minute Podcast Startup
Ingram 出版How to start and monetize a podcast in one monthWould you like to turn your podcast idea into a via
-
Transfer Learning for Natural Language Processing
Ingram 出版Build custom NLP models in record time by adapting pre-trained machine learning models to solve spe
-
Crime Dot Com
Reaktion B 出版From Anonymous to the Dark Web, a dizzying account of hacking--past, present, and future. "Brillia
-
Industrial Applications of Neural Networks
CRC Press 出版Industrial Applications of Neural Networks explores the success of neural networks in different are
-
SEO for Small Businesses Part 2
SEO for Small BusinessesSEO for Small Businesses Part 2: SEO and On-Page Optimization or the SEO or
-
Internet Searching and Indexing
CRC Press 出版Prevent information overload with better indexing and retrieval strategies!In the fast-changing wor
-
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Ingram 出版Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Ther
-
Advance Wordpress Mastery Kit
Gary Bird 出版Do You Want To Take Your Website & Business To The Next Level With WordPress?Grab This Stupendous '
-
The Art of Attack
Wiley 出版Take on the perspective of an attacker with this insightful new resource for ethical hackers, pente
-
Security Essentials
This Laboratory Manual complements the Security Essentials textbook and classroom-related studies.
-
Podcast
George Sims 出版Are you ready to start your own podcast?Learning how to podcast isn't hard, but there are a lot of
-
Learning Php, MySQL & JavaScript
Ingram 出版Build interactive, data-driven websites with the potent combination of open source technologies and
-
Account Security Lockdown
Gary Bird 出版How can you prevent ANY AND ALL security threats now and forever?Let me show you EXACTLY how you do
-
Logged Off
How many likes did you receive on your last post? Are you satisfied with that number of likes? Jord
-
Digital Cryptology
Ingram 出版Computers and the internet forever changed how we communicate messages and other information. They
-
Cyber Security Mastery
Gary Bird 出版Google detected more than 2 million phishing sites in 2020!We present you with a fantastic opportun
-
Social Warming
Ingram 出版An impassioned exploration of the ways in which social media has manipulated us all 'Witty, rigorou
-
Security Essentials
Ingram 出版The Security Essentials Study Guide provides users with a valuable means of review and practice ess
-
23 Ways To Easily Increase Instagram Engagement In 2021
55% OFF for Bookstores! Discounted Retail Price NOW at $14,40 instead of $32,0023 Ways To Easily In
-
Protocol Discovery
Today with the tremendous series of undocumented or poorly documented protocols how an incident res
-
Comprehensive Performance Analysis of DW Code Family for SAC-OCDMA
The performance of a realistic optical code-division Multiple-Access OCDMA network have been evalua
-
Adaptive Load Balancing Based Traffic Engineering For VoIP On Network
The original idea is very important for researcher who needs to complete his dissertation or journa
-
Contemporary Models of Wireless Communications and Networks
For courses in wireless networking wireless communications, wireless data communications or wireles
-
New Approaches to Improve the Security and QoS in MANET
Mobile Ad-hoc network is a set of wireless devices called wireless nodes, which dynamically connect
-
Analysis of digital portfolios of graphic designers in Ecuador
This research analyzes the digital portfolios of Ecuadorian graphic designers and the possibilities
-
Building a Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classifie
-
-
-
-
-
-
Hypercube Interconnected Communication Network
The hypercube is one of the most popular interconnected topologies for parallel processing due to i