BOOKS - NETWORK TECHNOLOGIES - Blockchain for Cybersecurity and Privacy Architectures...
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit) - Yassine Maleh(Editor), Mohammad Shojafar (Editor), Mamoun Alazab (Editor), Imed Romdhani (Editor) 2020 PDF CRC Press BOOKS NETWORK TECHNOLOGIES
ECO~18 kg CO²

1 TON

Views
37833

Telegram
 
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit)
Author: Yassine Maleh(Editor), Mohammad Shojafar (Editor), Mamoun Alazab (Editor), Imed Romdhani (Editor)
Year: 2020
Pages: 406
Format: PDF
File size: 15.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Designing Software Architectures A Practical Approach, 2nd Edition (Final)
Advanced Electronic Circuits Principles, Architectures and Applications on Emerging Technologies
Architectures of Fire: Processes, Space and Agency in Pyrotechnologies (Access Archaeology)
Advanced Nanoscale MOSFET Architectures Current Trends and Future Perspectives
High Dynamic Range Imaging Sensors and Architectures, 2nd Edition
Modern Big Data Architectures A Multi-Agent Systems Perspective
Network Convergence Ethernet Applications and Next Generation Packet Transport Architectures
Designing Software Architectures A Practical Approach, 2nd Edition (Final)
Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
ZooBC New Strategies in Blockchain
Blockchain Blueprint for a New Economy
Blockchain for IoT Systems
Architecture for Blockchain Applications
Blockchain The Advent of Disintermediation
Blockchain Technology and Applications
Build a Blockchain from Scratch in Go
Blockchain Foundations For the Internet of Value
Blockchain Straight to the Point
Cryptocurrency and Blockchain Technology
The Voice Catchers How Marketers Listen In to Exploit Your Feelings, Your Privacy, and Your Wallet
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Protecting Privacy in Data Release (Advances in Information Security Book 57)
How the Internet Really Works An Illustrated Guide to Protocols, Privacy, Censorship, and Governance
Security, Privacy, and Anonymization in Social Networks Emerging Research and Opportunities
A Practical Guide to Networking, Privacy & Security in iOS 12 version 1.1
Innovations in Federal Statistics: Combining Data Sources While Protecting Privacy
The Politics of Personal Information: Surveillance, Privacy, and Power in West Germany
Your Face Belongs to Us: A Secretive Startup|s Quest to End Privacy as We Know It
Federal Statistics, Multiple Data Sources, and Privacy Protection: Next Steps
IAPP CIPP / US Certified Information Privacy Professional Study Guide
The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age
High-Performance Data Architectures How to Maximize Your Business with a Cloud-Based Database
Deep Learning Theory, Architectures and Applications in Speech, Image and Language Processing
Designing Software Architectures A Practical Approach, 2nd Edition (Early Release)
Building Multi-Tenant SaaS Architectures Principles, Practices, and Patterns Using AWS
Concise Guide to the Internet of Things A Hands-On Introduction to Technologies, Procedures, and Architectures
Flow Architectures The Future of Streaming and Event-Driven Integration (Early Release)
Deep Learning Theory, Architectures and Applications in Speech, Image and Language Processing
Inter-Service Communication with Go Mastering protocols, queues, and event-driven architectures in Go
Software Architecture The Hard Parts Modern Trade-Off Analyses for Distributed Architectures