计算机与互联网 第298页

Rust for Network Programming and Automation, Second Edition: Work around designing networks, TCP/IP protocol, packet ana...

API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementat...
Service-Oriented Computing – ICSOC 2021 Workshops: AIOps, STRAPS, AI-PA and Satellite Events, Dubai, United Arab Emirate...

Digital Shakedown: The Complete Guide to Understanding and Combating Ransomware by: Harry Halikias (Author) Publisher: S...

Black Hat Bash: Creative Scripting for Hackers and Pentesters by: Nick Aleks (Author),Dolev Farhi(Author) Publisher: No ...

Securing Cloud PCs and Azure Virtual Desktop: Start implementing and optimizing security for Windows 365 and AVD infrast...

Resource Management on Distributed Systems: Principles and Techniques by: Shikharesh Majumdar (Author) Publisher: Wiley-...

Blockchains: Empowering Technologies and Industrial Applications (IEEE Series on Digital & Mobile Communication) by:...

Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience by: Rohan...

Data Migration for SAP: SAP S/4HANA and Cloud Solutions (SAP PRESS) by: Frank Finkbohner (Author),Martina Höft(Author),M...