(Ilmumisaeg: 23-Apr-2026, EPUB+DRM, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284315097)
Access Control and Identity Management, Fourth Edition, offers focused, in-depth coverage of identity and access management for cybersecurity courses in higher education and professional training programs. Unlike survey texts that devote only a few c...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235430815)
Master the ISC2 Certified in Cybersecurity (CC) exam with this extensive practice test collection. Whether you are starting your journey in cybersecurity or validating your foundational knowledge, this course provides the rigorous testing environment...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book features original, peer-reviewed research papers presented at the International Conference on Recent Trends in Artificial Intelligence and Data Sciences—CONFLUENCE 2025. It aims to showcase the latest developments in various fields of...Loe edasi...
This book features original, peer-reviewed research papers presented at the International Conference on Recent Trends in Artificial Intelligence and Data Sciences—CONFLUENCE 2025. It aims to showcase the latest developments in various fields of...Loe edasi...
(Ilmumisaeg: 16-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235480148)
Your expensive cameras and tracking apps are creating a false sense of safety while your kids remain vulnerable.Youve bought the smart doorbell, the GPS tracker, the parental control software. Youve spent hundreds of dollars and hours of setup R...Loe edasi...
This textbook provides a comprehensive exploration of the transport layer from the perspectives of computer networks and transport layer protocols, delving into the theoretical foundations and emerging application scenarios. It elucidates the princip...Loe edasi...
This textbook provides a comprehensive exploration of the transport layer from the perspectives of computer networks and transport layer protocols, delving into the theoretical foundations and emerging application scenarios. It elucidates the princip...Loe edasi...
As artificial intelligence becomes embedded in everything from healthcare diagnostics to financial systems and autonomous vehicles, the stakes for AI security have never been higher. Adversarial AI Threat Response and Secure Model Design is...Loe edasi...
As artificial intelligence becomes embedded in everything from healthcare diagnostics to financial systems and autonomous vehicles, the stakes for AI security have never been higher. Adversarial AI Threat Response and Secure Model Design is...Loe edasi...
As a seasoned PHP developer, you’ve mastered classes, objects, and interfaces, yet bugs continue to surface after deployment, and often your clients are the ones discovering them. Frustrated by the tedious debugging and the stress of unexpected...Loe edasi...
As a seasoned PHP developer, you’ve mastered classes, objects, and interfaces, yet bugs continue to surface after deployment, and often your clients are the ones discovering them. Frustrated by the tedious debugging and the stress of unexpected...Loe edasi...
(Ilmumisaeg: 15-Apr-2026, EPUB+DRM, Kirjastus: Rob Satterfield, ISBN-13: 9798902164388)
In an age of ever-increasing cyberthreats, the demand for cybersecurity experts is soaring. With this guide, you will gain advanced skills in python programming, malware analysis, penetration testing, and network scanning. We will provide you with th...Loe edasi...