Machine Intelligence Applications in Cyber-Risk Management
Machine Intelligence Applications in Cyber-Risk Management Author: Mohammed Amin Almaiah (Editor), Yassine Maleh (Editor...
Machine Intelligence Applications in Cyber-Risk Management Author: Mohammed Amin Almaiah (Editor), Yassine Maleh (Editor...
Security and Privacy for 6G Massive IoT Author: Georgios Mantas (Editor), Firooz Saghezchi (Editor), Jonathan Rodriguez ...
Hybrid Communication Systems for Future 6G and Beyond: Visible Light Communication & Radio over Fiber Technology Au...
Metasploit, 2nd Edition Author: David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O’Gorman...
Learn Penetration Testing with Python 3.x: An ethical hacker’s blueprint for offensive security – 2nd Edition Auth...
IoT Signal Detection Author: Rui Han (Author), Jingjing Wang (Author), Lin Bai (Author), Jianwei Liu (Author) Publisher ...
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies) Author: Prabh Deep...
Signal Processing for Joint Radar Communications (IEEE Press) Author: Kumar Vijay Mishra (Editor), M. R. Bhavani Shankar...
Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment (Networking Technology) A...
Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking A...