熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 51 筆, 頁數 1 / 1
呈現:
Big Data Management and Analytics
With the proliferation of information, big data management and analysis have become an indispensable... more |
|||
Sdn and Nfv: A New Dimension to Virtualization
Software-defined network (SDN) and network function virtualization (NFV) are two technology trends t... more |
|||
Distributed Denial of Service (Ddos) Attacks: Classification, Attacks, Challenges and Countermeasures
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-b... more |
|||
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives
This book elaborates on various attacks on Social Networks with classifications, countermeasures and... more |
|||
Secure Searchable Encryption and Data Management
This book provides every necessary detail required to develop the secure searchable encryption schem... more |
|||
Smart Card Security: Applications, Attacks, and Countermeasures
This book provides an overview of smart card technology and explores different security attacks and ... more |
|||
A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals
book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is...... more |
|||
Secure Searchable Encryption and Data Management
With the advent of the IT revolution, the volume of data produced has increased exponentially and is... more |
|||
Distributed Denial of Service (Ddos) Attacks: Classification, Attacks, Challenges and Countermeasures
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-b... more |
|||
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives
In recent years, virtual meeting technology has become a part of the everyday lives of more and more... more |
|||
Internet of Things Security: Principles, Applications, Attacks, and Countermeasures
Internet of Things (IoT) with its technological advancements and massive innovations is building the... more |
|||
Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices
While Computer Security is a broader term which incorporates technologies, protocols, standards and ... more |
|||
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
This is a monumental reference for the theory and practice of computer security. Comprehensive in sc... more |
|||
AI for Big Data-Based Engineering Applications from Security Perspectives
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning fr... more |
|||
Secure Data Management for Online Learning Applications
This book talks about the theoretical frameworks, technical methodologies, Information security, and... more |
|||
Advanced Circuits and Systems for Healthcare and Security Applications
VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI... more |
|||
Big Data Analytics in Fog-Enabled Iot Networks: Towards a Privacy and Security Perspective
This book emphasizes and facilitate a greater understanding of various security and privacy approach... more |
|||
Distributed Intelligent Circuits and Systems
The main objective of this book is to provide insights into recent advances in distributed intellige... more |
|||
Handbook of Research on AI and ML for Intelligent Machines and Systems
The Handbook of Research on AI and ML for Intelligent Machines and Systems offers a comprehensive ex... more |
|||
AI for Big Data Based Engineering Applications from the Security Perspectives
This book emphasizes the idea of understanding the motivation of the advanced circuits’ design to es... more |
|||
Cloud Security: Concepts, Applications and Perspectives
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT... more |
|||
Big Data Analytics in Fog-Enabled Iot Networks: Towards a Privacy and Security Perspective
The integration of fog computing with the resource-limited Internet of Things (IoT) network formulat... more |
|||
Secure Data Management for Online Learning Applications
With the increasing use of e-learning, technology has not only revolutionized the way businesses ope... more |
|||
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities
This book bridges principles and real-world applications, while also providing thorough theory and t... more |
|||
Handbook of Research on Digitalization Solutions for Social and Economic Needs
"This book helps readers argue the business rationale of digitalization, introducing the agile opera... more |
|||
Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies
With the increasing demand of robots for industrial and domestic use, it becomes indispensable to en... more |
|||
Advanced Circuits and Systems for Healthcare and Security Applications
VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI... more |
|||
Recent Advances in Security, Privacy, and Trust for Internet of Things (Iot) and Cyber-Physical Systems (Cps)
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are di... more |
|||
Handbook of Research on Digital Transformation Management and Tools
|
|||
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities
This book bridges principles and real-world applications, while also providing thorough theory and t... more |
|||
Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
"This book explores the key concepts of data mining and utilizing them on online social media platfo... more |
|||
Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
"This book explores the key concepts of data mining and utilizing them on online social media platfo... more |
|||
Advances in Malware and Data-Driven Network Security
|
|||
Advances in Malware and Data-Driven Network Security
|
|||
Handbook of Computer Networks and Cyber Security: Principles and Paradigms
1. Security Frameworks in Mobile Cloud Computing.- 2. An investigation study of Privacy Preserving i... more |
|||
Cloud Security: Concepts, Applications and Perspectives
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT... more |
|||
Managing Iot and Mobile Technologies with Innovation, Trust, and Sustainable Computing
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and t... more |
|||
Managing Iot and Mobile Technologies with Innovation, Trust, and Sustainable Computing
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and t... more |
|||
Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices
While Computer Security is a broader term which incorporates technologies, protocols, standards and ... more |
|||
Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies: Algorithms, Applications, and Technologies
With the increasing demand of robots for industrial and domestic use, it becomes indispensable to en... more |
|||
Recent Advances in Security, Privacy and Trust for Internet-Of-Things (Iot) and Cyber-Physical Systems (Cps)
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are di... more |
|||
Handbook of Research on Multimedia Cyber Security
Because it makes the distribution and transmission of digital information much easier and more cost ... more |
|||
Handbook of Research on Intrusion Detection Systems
Businesses in today’s world are adopting technology-enabled operating models that aim to improve gro... more |
|||
Handbook of Computer Networks and Cyber Security: Principles and Paradigms
1. Security Frameworks in Mobile Cloud Computing.- 2. An investigation study of Privacy Preserving i... more |
|||
Modern Principles, Practices, and Algorithms for Cloud Security
In today’s modern age of information, new technologies are quickly emerging and being deployed into ... more |
|||
Modern Principles, Practices, and Algorithms for Cloud Security
|
|||
Security, Privacy, and Forensics Issues in Big Data
With the proliferation of devices connected to the internet and connected to each other, the volume ... more |
|||
Security, Privacy, and Forensics Issues in Big Data
|
|||
Edge Intelligence and Analytics for Internet of Things
Edge Computing and Intelligence is a new technical discipline that researches and develops theories,... more |
|||
International Conference on Smart Systems and Advanced Computing (Syscom 2022)
This book presents the International Conference on Smart Systems and Advanced Computing (SysCom 2022... more |
|||
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
|