As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not ……続きを見る
Unlock the power of effective project management in the realm of cybersecurity. In this comprehensive e-book, discover a strategic approach to safeguarding your digital assets while optimizing your ……続きを見る
Objective Information Theory (OIT) is proposed to represent and compute the information in a large-scale complex information system with big data in this monograph. To formally analyze, design, deve……続きを見る
"Data is the new oil" ー it has become a cliché now: any enterprise today understands that data is not just an opportunity; managing data is almost how managing a business is. The success of tech co……続きを見る
Passwords have been an integral part of people's lives. Yet passwords are insecure and allow cybercriminals to attack businesses and their users. However, replacing passwords widely with better auth……続きを見る
This open access book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book’s arrival is timely. Not only is the Internet of Th……続きを見る
出版社: Springer International Publishing
発売日: 2022年04月26日
The central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage domain. In the 21st century the world faces epochal changes which aff……続きを見る
The second volume in the SIRCA book series investigates the impact of information society initiatives by extending the boundaries of academic research into the realm of practice. Global in scope, it……続きを見る
Das Zukunftsprojekt „Industrie 4.0“, das ein zentrales Element der Hightech-Strategie der Bundesregierung darstellt, zielt auf die Informatisierung der klassischen Industrien, wie z. B. der industri……続きを見る
This is your practical guide to setting up a working environment and using Oracle Scheduler. Packed with simple examples and clear explanations, real-life scenarios are discussed to make you comfort……続きを見る
Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365
Key Features
Design, implement, and administer Microsoft Information Protecti……続きを見る
This book was written to inform users what a microSD® card is and why cellphones should include them in their devices. This book will inform you how to bypass a reactivation lock on certain Samsung ……続きを見る
In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and secu……続きを見る
Have you ever wanted to code but thought it would be to hard or complex. This book is a solution to that problem. Program 101 is a book designed to help you with coding concepts and how code works. ……続きを見る
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Network……続きを見る
Privacy for the Smart Grid provides easy-to-understand guidance on data privacy issues and the implications for creating privacy risk management programs, along with privacy policies and practices r……続きを見る
You just bought a Mac but you don't know…
how to pass data from your old pc
the BigSur operating system and would like to discover all the features
If you don't want to waste time on dispersed onlin……続きを見る
Winner of the Shingo Publication Award
Accelerate your organization to win in the marketplace.
How can we apply technology to drive business value? For years, we've been told that the performance of……続きを見る
This book tells the story of a common dream: Agile Inclusive Accelerator. The story of a project developed by many hands, which started with the arrival of ThoughtWorks in Tecnopuc and has been grow……続きを見る
Focusing on the recent proliferation of Wi-Fi in hospital systems, this book explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being imple……続きを見る
Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple ……続きを見る
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in conte……続きを見る
Let This Book Usher You Into The New And Interesting World Of iPhone SE So That You Make The Most Of Its Cutting Edge Features To Transform Your Life In All Manner Of Ways!
Have you recently purchas……続きを見る
著者:IP Specialist
出版社: IP Specialist
発売日: 2018年10月09日
Ec-Council Certified Ethical Hacker CEH v10 covers the latest exam blueprint, comprised of 20 Modules which includes the practice of information security and hacking tools which are popularly used b……続きを見る
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a W……続きを見る
This volume celebrates the career of Prof. Ricardo de Almeida Falbo on the occasion of his formal retirement. The volume includes reflections from collaborators and former students, casting light on……続きを見る
著者:Jimmy Ghinis
出版社: Jimmy Ghinis
発売日: 2020年02月10日
Academic book turns into a popular book read.
Artificial, linkage and conversion analysis. One of the three
is demonstrated to be the most important.
30 day tracking visitor period versus 24 hour pe……続きを見る
著者:Steven Levy
出版社: O'Reilly Media
発売日: 2010年05月19日
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the e……続きを見る
This sneak peek teaser - featuring literary giants John Grisham and Danielle Steele - from Chapter 2 of The Bestseller Code, a groundbreaking book about what a computer algorithm can teach us about ……続きを見る