Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
Ajouter à ma liste d'envies
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Editeur : Wiley-IEEE Press
Parution : 2023-05-16

PDF, ePub

121,75
Télécharger le livre :  SCADA Security
Ajouter à ma liste d'envies
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems?the control system architecture that uses computers, networked data communications, and graphical user...

Editeur : Wiley
Parution : 2020-12-09
Collection : Wiley Series on Parallel and Distributed Computing
PDF, ePub

127,60
Télécharger le livre :  Verification of Communication Protocols in Web Services
Ajouter à ma liste d'envies
In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have been putting various efforts and coming up with innovative ideas. Within the last few years, we have...

Editeur : Wiley
Parution : 2013-10-02
Collection : Wiley Series on Parallel and Distributed Computing
PDF

132,88
Télécharger le livre :  Fundamentals of Distributed Object Systems
Ajouter à ma liste d'envies
Distributed Object Computing teaches readers the fundamentals of CORBA, the leading architecture for design of software used in parallel and distributed computing applications. Since CORBA is based on open standards, it is the only effective way to learn object-oriented...

Editeur : Wiley-Interscience
Parution : 2004-04-07
Collection : Wiley Series on Parallel and Distributed Computing
PDF

140,26