计算机、互联网 第61页

Countering Hybrid Threats Against Critical Infrastructures (NATO Science for Peace and Security Series B:Physics and Bio...

Hacking Cryptography:Write, break, and fix real-world implementations by: Kamran Khan (Author), Bill Cox (Author) Publis...

Digital Literacy and Inclusion:Stories, Platforms, Communities by: Danica Radovanović (Editor) Publisher: Springer Editi...

The Cybersecurity Control Playbook:From Fundamentals to Advanced Strategies by: Jason Edwards (Author) Publisher: Wiley ...

Excel Quick and Easy by: Michael Alexander (Author), Dick Kusleika (Author) Publisher: Wiley Edition: 1st Publication Da...

Security Issues in Communication Devices, Networks and Computing Models by: Budati Anil Kumar (Editor), Akella Ramakrish...

The Art of Deep Learning Image Augmentation:The Seeds of Success (SpringerBriefs in Applied Sciences and Technology) by:...

Personalising Human-Robot Interactions in Social Contexts (Springer Tracts in Advanced Robotics, 159) by: Antonio Andrie...

Enterprise Design Fundamentals:Settling an Enterprise Business and Devising the Enterprise Organisation (The Enterprise ...

The Second Renaissance:How AI Will Transform Science, Technology and Entrepreneurship by: Robert H. Hacker (Author) Publ...