15 results

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

Artificial Intelligence and Blockchain for Future Cybersecurity Applications

Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2
Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications P...

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications

Book
Maleh, Y., Shojaafar, M., Alazab, M., & Romdhani, I. (Eds.)
(2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press (Taylor and Francis Group
Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology...

Personal networks in festival, event and creative communities: perceptions, connections and collaborations

Book
Jarman, D. (2018)
Personal networks in festival, event and creative communities: perceptions, connections and collaborations. In A. Jepson, & ‎. Clarke (Eds.), Advances in Events: Power, construction and meaning in communities, festivals and events, 65-89. Abingdon: Taylor & Francis (Routledge
No abstract available.

Securing the Internet of Things

Book
Romdhani, I. (2017)
Li, S. & Da Xu, L. (Eds.). Securing the Internet of Things. Elsevier. ISBN 9780128044582
Key Features Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats...

Uzytkowanie Komputerow.

Book
Buchanan, W. J. (2004)
Uzytkowanie Komputerow. Wkt (Poland
Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich komp...

Handbook of data communications and networks.

Book
Buchanan, W. J. (2003)
Handbook of data communications and networks. Springer
The second edition of the Handbook of Data Communications and Networks covers many of the key areas in modern communication systems. It is split into several sections, includi...

The complete handbook of the Internet.

Book
Buchanan, W. J. (2001)
The complete handbook of the Internet. KLUWER ACADEMIC PUBLISHERS BOSTON

PC Interfacing, communications and Windows programming.

Book
Buchanan, W. J. (1998)
PC Interfacing, communications and Windows programming. Addison-Wesley Longman Ltd
author's successful Applied PC Interfacing, Graphics and Interrupts this book covers all the different aspects of computer systems from low-level hardware (such as processors ...

Advanced PC interfacing, communications and Windows programming.

Book
Buchanan, W. J. (1997)
Advanced PC interfacing, communications and Windows programming. Addison-Wesley

Date


Date


Date


Date