BOOKS - NETWORK TECHNOLOGIES - Blockchain for Cybersecurity and Privacy Architectures...
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit) - Yassine Maleh(Editor), Mohammad Shojafar (Editor), Mamoun Alazab (Editor), Imed Romdhani (Editor) 2020 PDF CRC Press BOOKS NETWORK TECHNOLOGIES
ECO~18 kg CO²

1 TON

Views
37831

Telegram
 
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit)
Author: Yassine Maleh(Editor), Mohammad Shojafar (Editor), Mamoun Alazab (Editor), Imed Romdhani (Editor)
Year: 2020
Pages: 406
Format: PDF
File size: 15.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Data Privacy
Privacy (Prepared #3)
Invasion of Privacy
Architectures of Spatial Justice
Learning Deep Architectures for AI
Data Privacy: What Enterprises Need to Know?
Mobile Security and Privacy
Privacy Code (Shatterproof, #1)
My Online Privacy for Seniors
Privacy Preservation of Genomic
Security and Privacy in Web 3.0
Privacy in the Age of Shakespeare
The Poverty of Privacy Rights
Security and Privacy in Web 3.0
Math and Architectures of Deep Learning
Australia Modern Architectures in History
Modern Data Architectures with Pytho
Data Storage Architectures and Technologies
The Story of Follies Architectures of Eccentricity
Designing Software Architectures, 2nd Ed
Grace and Gravity: Architectures of the Figure
Building Evolutionary Architectures, 2nd Ed.
Data Storage Architectures and Technologies
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Security and Privacy in the Internet of Things
Security and Privacy for 6G Massive IoT
Privacy and the Politics of Intimate Life
Privacy-Preserving in Mobile Crowdsensing
Your Right to Privacy Minimize Your Digital Footprint
Privacy (Teen Rights and Freedoms)
5G Wireless Network Security and Privacy
Privacy: Concealing the Eighteenth-Century Self
Human Factors in Privacy Research
IoT Security and Privacy Paradigm
Privacy-Preserving Machine Learning
Information Insecurity: Privacy Under Siege
Security and Privacy in the Digital Era
Privacy Rights in the Digital Age
5G Wireless Network Security and Privacy
Circuits and Systems for Security and Privacy