BOOKS - PROGRAMMING - The Blockchain Technology for Secure and Smart Applications acr...
The Blockchain Technology for Secure and Smart Applications across Industry Verticals (Advances in Computers, Volume 121) - Neeraj Kumar(Editor), Shubhani Aggarwal (Editor), Pethuru Raj (Editor) 2021 PDF Elsevier Inc BOOKS PROGRAMMING
ECO~19 kg CO²

2 TON

Views
86961

Telegram
 
The Blockchain Technology for Secure and Smart Applications across Industry Verticals (Advances in Computers, Volume 121)
Author: Neeraj Kumar(Editor), Shubhani Aggarwal (Editor), Pethuru Raj (Editor)
Year: 2021
Pages: 517
Format: PDF
File size: 54 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Building Secure and Reliable Systems Best Practices for Designing, Implementing, and Maintaining Systems (Google version)
Split Federated Learning for Secure IoT Applications Concepts, frameworks, applications and case studies
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)
Hands-On Kubernetes, Service Mesh and Zero-Trust Build and manage secure applications using Kubernetes and Istio
Practical Web Penetration Testing: Secure web applications using Burp Suite, Nmap, Metasploit, and more
Cloud Native Security Cookbook Recipes for a Secure Cloud
Cybersecurity Crash Course: Learn Fast, Protect Faster! Don|t Be the Next Victim. Secure your computers, smartphones, and tablets. (Python Trailblazer|s Bible)
How to Defend Your Family and Home: Outsmart an Invader, Secure Your Home, Prevent a Burglary and Protect Your Loved Ones from Any Threat
The Cloud Computing Journey: Design and deploy resilient and secure multi-cloud systems with practical guidance
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation
Hands-on Cryptography with Python Master Cryptographic Foundations with Real-World Implementation for Secure System Development Using Python
Software Security Building secure software applications
Kryptowahrungen - von TenX Co-Founder Dr. Julian Hosp einfach erklart: Bitcoin, Ethereum, Blockchain, Dezentralisierung, Mining, ICOs and Co. (German Edition)
Spring Security - Fourth Edition: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures
Blockchain-Based Data Security in Heterogeneous Communications Networks (Wireless Networks)
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications (Internal Audit and IT Audit)
BLOCKCHAIN: A Tool For Freedom or Enslavement: Understanding Blockchains, Understanding Freedoms
Cryptocurrency A Complete Guide On How To Trade How To Trade Bitcoin, Ethereum and Blockchain!
Artificial Intelligence & Blockchain in Cyber Physical Systems Technologies & Applications
Artificial Intelligence & Blockchain in Cyber Physical Systems Technologies & Applications
Ripple Quick Start Guide: Get started with XRP and develop applications on Ripple|s blockchain
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks An Ultimate Guide To Secure Your Cloud And On-Premise Networks
The No Nonsense Anxious Attachment Book: Become secure in life, dating, love, relationships, and work through cognitive behavioral therapy, self-care, and targeted techniques (Adulting Hard Books)
Harlequin Presents February 2018 - Box Set 1 of 2: The Secret Valtinos Baby Bought with the Italian|s Ring A Proposal to Secure His Vengeance Redemption of a Ruthless Billionaire
Large-Scale Data Streaming, Processing, and Blockchain Security (Advances in Information Security, Privacy, and Ethics)
Blockchain, Artificial Intelligence and Financial Services: Implications and Applications for Finance and Accounting Professionals (Future of Business and Finance)
Safe, Sound and Secure: How to Protect Your Identity, Privacy, Money, Computers, Cellphones, Car, Home, Email, Internet Use, Wireless Networks, Credit, Debit and ATM Cards and Financial Accounts
Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings (Lecture Notes in Computer Science, 13700)
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
AI Models for Blockchain-Based Intelligent Networks in IoT Systems: Concepts, Methodologies, Tools, and Applications (Engineering Cyber-Physical Systems and Critical Infrastructures, 6)
Databricks Lakehouse Platform Cookbook: 100+ recipes for building a scalable and secure Databricks Lakehouse (English Edition)
Web Development Toolkit for Java Developers: Build dynamic, secure, and scalable web applications with Java (English Edition)
Bulletproof TLS and PKI Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications, 2nd Edition
Bulletproof SSL and TLS Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Ultimate Azure IaaS for Infrastructure Management Unleash Azure’s Compute, Storage and Network Components to Architect and Secure Your Cloud Infrastructure
Ultimate Azure IaaS for Infrastructure Management Unleash Azure’s Compute, Storage and Network Components to Architect and Secure Your Cloud Infrastructure
Secure Recovery: Approaches to Recovery in Forensic Mental Health Settings (Issues in Forensic Psychology)
Mastering Shell for DevOps Automate, streamline, and secure DevOps workflows with modern shell scripting
Databricks Lakehouse Platform Cookbook 100+ recipes for building a scalable and secure Databricks Lakehouse
Databricks Lakehouse Platform Cookbook 100+ recipes for building a scalable and secure Databricks Lakehouse