Bemærk: Kan ikke leveres før jul.
This book examines whether technology can be used to fix the very problems caused by technology, as the various... Læs mere
Bemærk: Kan ikke leveres før jul.
This book examines whether technology can be used to fix the very problems caused by technology, as the various... Læs mere
Bemærk: Kan ikke leveres før jul.
This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications.
Bemærk: Kan ikke leveres før jul.
This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications.
Bemærk: Kan ikke leveres før jul.
This book is an insightful meta-narrative about schooling which explores the global natural experiment of the COVID-19 pandemic and its potential impact on school culture.
Bemærk: Kan ikke leveres før jul.
Cryptoeconomics is based on protocols of decentralized digital economics used to manage the production, distribution, and consumption of goods and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores how to secure the future state of the Internet of Things. Looking at an imminent... Læs mere
Bemærk: Kan ikke leveres før jul.
This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets.
Bemærk: Kan ikke leveres før jul.
The book covers all knowledge areas from the BABOK®, Third Edition, and is designed to be a study guide for the CBAP® certification from IIBA™. It includes... Læs mere
Bemærk: Kan ikke leveres før jul.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.
Bemærk: Kan ikke leveres før jul.
3D printing poses many challenges to the traditional law of intellectual property (IP). This book develops a technical system to help overcome some of these legal challenges and difficulties.