BOOKS - Cyber Security for Next-Generation Computing Technologies
Cyber Security for Next-Generation Computing Technologies - Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda 2024 PDF CRC Press BOOKS
ECO~15 kg CO²

1 TON

Views
51563

Telegram
 
Cyber Security for Next-Generation Computing Technologies
Author: Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda
Year: 2024
Pages: 328
Format: PDF
File size: 11.5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

A Practical Guide on Security and Privacy in Cyber-Physical Systems Foundations, Applications and Limitations
Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies)
Cyber Crime Investigations Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutor
A Practical Guide on Security and Privacy in Cyber-Physical Systems Foundations, Applications and Limitations
Security in Computing, 6th Edition (Final)
Security in Computing, 6th Edition (Final)
Data Security in Cloud Computing, Volume I
Cloud Computing Implementation, Management, and Security
Security Management in Mobile Cloud Computing
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 (Lecture Notes on Data Engineering and Communications Technologies Book 170)
Fundamental and Supportive Technologies for 5G Mobile Networks (Advances in Systems Analysis, Software Engineering, and High Performance Computing)
Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Software Optimizations and Hardware Software Codesign
Security Opportunities in Nano Devices and Emerging Technologies
Cyber Defense Mechanisms Security, Privacy, and Challenges (Artificial Intelligence (AI) Elementary to Advanced Practices)
Mobile Cloud Computing Models, Implementation, and Security
Improving Security, Privacy, and Trust in Cloud Computing
Handbook of Research on Security Considerations in Cloud Computing
Improving Security, Privacy, and Trust in Cloud Computing
Industry 5.0 for Smart Healthcare Technologies: Utilizing Artificial Intelligence, Internet of Medical Things and Blockchain (Edge AI in Future Computing)
Communication Technologies and Security Challenges in IoT Present and Future
Theory and Practice of Cryptography and Network Security Protocols and Technologies
Performance and Security for the Internet of Things Emerging Wireless Technologies
Communication Technologies and Security Challenges in IoT Present and Future
Energy Generation and Efficiency Technologies for Green Residential Buildings (Energy Engineering)
Advanced Technologies for Next Generation Integrated Circuits (Materials, Circuits and Devices)
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security
Security and Privacy for Big Data, Cloud Computing and Applications
Quantum Computing A Journey into the Next Frontier of Information and Communication Security
Next Generation Wireless Communication: Advances in Optical, mm-Wave, and THz Technologies (Signals and Communication Technology)
Energetic Materials Advanced Processing Technologies for Next-Generation Materials
Safety, Security, and Reliability of Robotic Systems Algorithms, Applications, and Technologies
Hybridization of Blockchain and Cloud Computing Overcoming Security Issues in IoT
Cloud Computing Concepts, Technology, Security, and Architecture, Second Edition (Final)
Hybridization of Blockchain and Cloud Computing: Overcoming Security Issues in IoT
Cloud Computing Concepts, Technology, Security, and Architecture, Second Edition (Final)
Collection Management in the Cloud: A Guide for Using Cloud Computing Technologies in Libraries (LITA Guides)
Exam Ref AZ-500 Microsoft Azure Security Technologies, 3rd Edition
Algorithms: Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences, 17)
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond