BOOKS - NETWORK TECHNOLOGIES - Blockchain for Cybersecurity and Privacy Architectures...
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit) - Yassine Maleh(Editor), Mohammad Shojafar (Editor), Mamoun Alazab (Editor), Imed Romdhani (Editor) 2020 PDF CRC Press BOOKS NETWORK TECHNOLOGIES
ECO~18 kg CO²

1 TON

Views
37829

Telegram
 
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit)
Author: Yassine Maleh(Editor), Mohammad Shojafar (Editor), Mamoun Alazab (Editor), Imed Romdhani (Editor)
Year: 2020
Pages: 406
Format: PDF
File size: 15.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Atmospheric Architectures: The Aesthetics of Felt Spaces
Math and Architectures of Deep Learning (MEAP)
Explainable Machine Learning Models and Architectures
Coding Theory - Algorithms, Architectures, and Applications
Security without Obscurity A Guide to Cryptographic Architectures
Software Architectures Topics Usually Missed in Textbooks
Beginning Serverless Architectures with Microsoft Azure
Software Architectures Topics Usually Missed in Textbooks
Internet of Things Architectures, Protocols and Standards
Multi-Processor System-on-Chip 1 Architectures
Serverless Architectures on AWS, 2nd Edition
Software Architectures: Topics Usually Missed in Textbooks
Serverless Architectures on AWS, Second Edition (MEAP)
Explainable Machine Learning Models and Architectures
Protocols and Architectures for Wireless Sensor Networks
Networks of the Future Architectures, Technologies, and Implementations
SOA Governance in Action REST and WS-* Architectures
Privacy in Vehicular Networks Challenges and Solutions
The Right to Be Forgotten: Privacy and the Media in the Digital Age
Protecting Personal Information: The Right to Privacy Reconsidered
Tor From the Dark Web to the Future of Privacy
The Unwanted Gaze: The Destruction of Privacy in America
How to Avoid Electronic Eavesdropping and Privacy Invasion
The Handbook of Privacy Studies: An Interdisciplinary Introduction
Privilege, Privacy and Confidentiality in Family Proceedings
Beyond the Algorithm AI, Security, Privacy, and Ethics (Final)
Privacy, Security, and Cyberspace, Revised Edition
Privacy Preservation of Genomic and Medical Data
Beyond the Algorithm AI, Security, Privacy, and Ethics (Final)
Tor From the Dark Web to the Future of Privacy
Trust, Security and Privacy for Big Data
Laws of Image: Privacy and Publicity in America
Tor: From the Dark Web to the Future of Privacy
Security and Privacy in Smart Sensor Networks
Privacy Preservation of Genomic and Medical Data
Security, Privacy, and Digital Forensics in the Cloud
Invasion of Privacy (John Francis Cuddy, #11)
Reference Architectures for Critical Domains: Industrial Uses and Impacts
Smart SOA Platforms in Cloud Computing Architectures
Network Routing Algorithms, Protocols, and Architectures, Second Edition