31 |
Hacking and Penetration Testing with Low Power Devices
|
Monograph
|
-Empty-
|
Philip Polstra
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128007518
|
32 |
High Performance Parallelism Pearls
|
Monograph
|
-Empty-
|
James Reinders and Jim Jeffers
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128021187
|
33 |
High-Performance Embedded Computing (Second Edition)
|
Monograph
|
-Empty-
|
Marilyn Wolf
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780124105119
|
34 |
How to Attack and Defend Your Website
|
Monograph
|
-Empty-
|
Max Dalziel
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128027325
|
35 |
How to Define and Build an Effective Cyber Threat Intelligence Capability
|
Monograph
|
-Empty-
|
Max Dalziel
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128027301
|
36 |
Industrial Network Security (Second Edition)
|
Monograph
|
-Empty-
|
Eric D. Knapp and Joel Langill
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780124201149
|
37 |
Information Hiding in Speech Signals for Secure Communication
|
Monograph
|
-Empty-
|
Zhijun Wu
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128013281
|
38 |
Information Management
|
Monograph
|
-Empty-
|
William Mcknight
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780124080560
|
39 |
Information Security Analytics
|
Monograph
|
-Empty-
|
Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128002070
|
40 |
Interaction Flow Modeling Language
|
Monograph
|
-Empty-
|
Marco Brambilla and Piero Fraternali
|
ScienceDirect
|
2024-06-10 20:11
|
Current
|
https://www.sciencedirect.com/science/book/9780128001080
|