Home
Login
A Systematic Review on Deep- Learning-Based Phishing Email Detection
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
Internet of Things: Security and Solutions Survey
ENISA Threat Landscape
OWASP Web Security Testing Guide
NIST SP 800-53 — Security and Privacy Controls for Information Systems and Organizations
An Introduction to Information Security
The NIST Cybersecurity Framework (CSF)
Design Patterns for Cloud Native Applications
Model-based Reinforcement Learning for Service Mesh Fault Resiliency in a Web Application-level
Network Functions Virtualisation
Designing Data-Intensive Applications PDF
Building Microservices: Designing Fine-Grained Systems-Second Edition
Enterprise Integration Patterns
Usability Issues With Mobile Applications: Insights From Practitioners and Future Research Directions
Survey of Decentralized Solutions with Mobile Devices for User Location Tracking, Proximity Detection, and Contact Tracing in the COVID-19 Era
Introduction to Computer Graphics
Teaching User Experience Design Ethics to Engineering Students: Lessons Learned
Developing Graphics Frameworks with Python and OpenGL
Seeing Ourselves Through Technology
The Logic of Strategic Assets: From Oil to AI
The Privacy Engineers’ Manifesto
The Psychology of Silicon Valley
« Previous
1
…
32
33
34
35
36
…
158
Next »
My Bookmarks
NUMBER OF BOOKS
0
No Favorites
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
Lost Password?
Layer 1
Hey, Please Login
Sign in
💬 Chat with AI