Managing Organizational Change During SAP Implementations
Luc Galoppin & Siegfried Caems
DEAD(ish)
Naomi Kramer
New Discourse on Language: Functional Perspectives on Multimodality, ...
Monika Bednarek & J. R. Martin
Medieval Philosophy of Religion: The History of Western Philosophy ...
Graham Oppy & Nick N. Trakakis
The Physicists’ View of Nature Part 2: The Quantum Revolution
Amit Goswami
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Forensic Computing
A. J. Sammes & Brian Jenkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya