Processing Inaccurate Information: Theoretical and Applied Perspectives ...
David N. Rapp & Jason L. G. Braasch
Natural Language Processing for Historical Texts
Michael Piotrowski
The Lions' Den: Zionism and the Left From Hannah Arendt to Noam ...
Susie Linfield
Think on My Words: Exploring Shakespeare's Language
David Crystal
Ultimate Data Engineering With Databricks: Develop Scalable ...
Mayank Malhotra
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Forensic Computing
A. J. Sammes & Brian Jenkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya