BOOKS - NETWORK TECHNOLOGIES - Cyber Security for Next-Generation Computing Technolog...
Cyber Security for Next-Generation Computing Technologies - Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda 2024 PDF CRC Press BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
77101

Telegram
 
Cyber Security for Next-Generation Computing Technologies
Author: Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda
Year: 2024
Pages: 328
Format: PDF
File size: 11.5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Stochastic Methods in Scientific Computing: From Foundations to Advanced Techniques (Chapman and Hall CRC Numerical Analysis and Scientific Computing Series)
Quantum Computing A New Era of Computing
Quantum Computing: A New Era of Computing
Data-Centric Business and Applications: ICT Systems - Theory, Radio-Electronics, Information Technologies and Cybersecurity (Lecture Notes on Data Engineering and Communications Technologies)
Handbook of Unconventional Computing: Theory Implementations (Wspc Book Series in Unconventional Computing)
Computer Vision, Image Generation and IoT AI: Unleash the Power of Visual Intelligence, Image Generation and Internet of Things using Artificial Intelligence
The basics of cloud computing understanding the fundamentals of cloud computing in theory and practice
Cloud Computing Demystified for Aspiring Professionals: Hone your skills in AWS, Azure, and Google cloud computing and boost your career as a cloud engineer
Advanced Intelligent Virtual Reality Technologies: Proceedings of 6th International Conference on Artificial Intelligence and Virtual Reality (AIVR … Innovation, Systems and Technologies, 330)
Manufacturing Technologies and Production Systems (Sustainable Manufacturing Technologies)
From Distributed Quantum Computing to Quantum Internet Computing: An Introduction
From Distributed Quantum Computing to Quantum Internet Computing An Introduction
Productizing Quantum Computing Bring Quantum Computing Into Your Organization
From Distributed Quantum Computing to Quantum Internet Computing An Introduction
Productizing Quantum Computing Bring Quantum Computing Into Your Organization
Cyber Squad, Level 1 (Cyber Squad #1)
Quantum Computing and Future: Understand Quantum Computing and Its Impact on the Future of Business (English Edition)
Social Security Disability Insurance (American Political, Economic, and Security Issues)
Thor|s Microsoft Security Bible A Collection of Practical Security Techniques
Singer|s Security: An MM First Time Bodyguard Romance (Alden Security Book 2)
Agile Application Security Enabling Security in a Continuous Delivery Pipeline
Enhancing IoT Security A holistic approach to security for connected platforms
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Rethinking (In)Security in the European Union: The Migration-Identity-Security Nexus
CompTIA Security+ Guide to Network Security Fundamentals, Seventh Edition
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Enhancing IoT Security A holistic approach to security for connected platforms
Japan s Evolving Notion of National Security (Asian Political, Economic and Security Issues)
Her Private Security Detail: A Thrilling Bodyguard Romance (The Toure Security Group Book 2)
Enhancing IoT Security: A holistic approach to security for connected platforms (English Edition)
The Supply Side of Security: A Market Theory of Military Alliances (Studies in Asian Security)
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Living Weapons: Biological Warfare and International Security (Cornell Studies in Security Affairs)
Normalizing Japan: Politics, Identity, and the Evolution of Security Practice (Studies in Asian Security)
Advances on Broad-Band Wireless Computing, Communication and Applications: Proceedings of the 16th International Conference on Broad-Band Wireless Computing, … Notes in Networks and Systems Book
The Hidden Potential of DNS In Security Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals