by
Bokhari, M. U. editor.
Format:
Electronic Resources
Excerpt:
readers about the technology in general and the internet in particular. The book uncovers the various
2.
by
Sianjina, Rayton R.
Format:
Electronic Resources
Excerpt:
real leaders have encountered and end-of-chapter questions and activities help readers make connections
View Other Search Results
by
Androulidakis, Iosif I. author.
Format:
Electronic Resources
Excerpt:
present in the use of mobile phones while readers will also learn where forensics data reside in the
by
Russell, Ryan.
Format:
Electronic Resources
Excerpt:
by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically
by
Beale, Jay.
Format:
Electronic Resources
Excerpt:
first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive
by
NG, Chee Keong. author.
Format:
Electronic Resources
Excerpt:
readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such
by
Selmic, Rastko R. author.
Format:
Electronic Resources
Excerpt:
building blocks will allow readers to program specialized applications and conduct research in advanced
by
R. Rowlingson, Robert.
Format:
Electronic Resources
Excerpt:
, privacy, and data. By improving their awareness and protection, readers are far less likely to suffer the
by
Winkler, Ira.
Format:
Electronic Resources
Excerpt:
, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see
by
'ken'@ftu.
Format:
Electronic Resources
Excerpt:
. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and
by
Kim, Kwangjo. author.
Format:
Electronic Resources
Excerpt:
various deep-learning applications helps readers gain a basic understanding of machine learning, and
by
Karuppayah, Shankar. author.
Format:
Electronic Resources
Excerpt:
a simulation scenario. In addition to providing readers with an in-depth understanding of P2P
Limit Search Results
Narrowed by: