193 rezultatov
-
Core Data Analysis: Summarization, Correlation, and Visualization(2019) MIRKIN, BORISVezava: Mehka84,21 € -
-
Mindf*ck(2020) WYLIE, CHRISTOPHERFrom whistleblower Christopher Wylie, the definitive story of the Brexit coup, the making of Bannon's America, and an ongoing crime against democracy.Vezava: Mehka18,21 € -
Hands-On Smart Contract Development with Solidity and Ethereum(2019) SOLORIO, KEVIN,KANNA, RANDALL,HOOVER, DAVID HReady to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distribVezava: Mehka68,39 € -
Fakes, Scams & Forgeries(2022) INNES, BRIANFakes, Scams and Forgeries details many of the most notorious deceptions in history, describing how they were perpetrated, and how they were eventually detected. As well as describing famous forgers and legendary frauds, the text deals with many modern scVezava: Trda28,03 € -
Building Digital Experience Platforms(2019) SHIVAKUMAR, SHAILESH KUMAR,SETHII, SOURABHHVezava: Mehka84,21 € -
Personalized Privacy Protection in Big Data(2021) QU, YOUYANG,NOSOUHI, MOHAMMAD REZA,CUI, LEI,YU, SHUIVezava: Trda84,21 € -
The Future of Violence - Robots and Germs, Hackers and Drones: Confronting the New Age of Threat(2017) BENJAMIN WITTESVezava: Mehka15,41 € -
Tools and Weapons(2021) SMITH, BRAD,BROWNE, CAROL ANNThe first book by Microsoft CLO Brad Smith, exploring the biggest questions facing humanity about techVezava: Mehka18,21 € -
BTEC Nationals Information Technology Student Book + Activebook(2016) PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID58,59 € -
-
Security Issues for Wireless Sensor Networks(2022) VERMA, PARAG,DUMKA, ANKUR,BHARDWAJ, ANUJ,KAUR, NAVNEET,ASHOK, ALAKNANDA (PANTNAGAR, COLLEGE OF TECHNOLOGY, G.B. PANT UNIVERSITY OF AGRICULTURE AND TECHNOLOGY, RUDRAPUI, UTTARAKHAND, INDIA),BISHT, ANIL KUMAR,GANGWAR, RAKSH PAL SINGHThis book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor networkVezava: Trda77,51 € -
Information Security Policies, Procedures, and Standards(2020) LANDOLL, DOUGLAS J. (LANTEGO, LLC, AUSTIN, TEXAS, USA)This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. HighlightingVezava: Mehka62,71 € -
Cybersecurity for Everyone(2020) SKILLICORN, DAVID B. (QUEEN'S UNIVERSITY, KINGSTON, ONTARIO, CANADA)Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the issues fully. Cybersecurity for Everyone is intended to help by describing the issVezava: Trda48,23 € -
Handbook of Applied Cryptography(1996) MENEZES, ALFRED J. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA),VAN OORSCHOT, PAUL C. (OTTAWA, ONTARIO, CANADA),VANSTONE, SCOTT A. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA)Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatVezava: Trda259,41 €










