Linked e-resources

Details

Introduction
By Failing to Prepare You are preparing to Fail
Authentication Methods and Applications
Design of Blockchain Polynomial Digests to Secure Method Authentication
Need of Cybersecurity for ERP Systems
IoT Architecture Vulnerabilities and Security Measures
Cybersecurity Advanced Persistent Threat Attacks
Securing Deep Learning Neural Networks
Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments
Conclusion.

Browse Subjects

Show more subjects...

Statistics

from
to
Export