0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

Foundations and Practice of Security

Kamel,Adi  著
Springer 出版
2025/06/21 出版

This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montr矇al, QC, Canada, during December 09-11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and criticalinfrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.

9 特價7307
立即代訂
下次再買

Cyber Secrets

H+ Press 出版
2025/06/21 出版

The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive technology, and digital wellbeingDesigned to accompany the Brain Rot! novel, this education guide equips educators, librarians, and caregivers with everything they need to lead timely, tech-aware learning. Aligned with ISTE Student Standards, it transforms complex issues-like algorithmic bias, emotional manipulation, and digital distraction-into accessible, age-appropriate lessons.The guide includes: Ready-to-use lesson plans tied to each chapter of the novelDiscussion prompts for classroom, book club, or home learning settingsTech-free and tech-supported activities to accommodate any learning environmentPrintable rubrics, worksheets, and visual resources for direct use with studentsCreative extensions including journaling, app audits, ethical design challenges, and roleplay scenariosWhether you're running a digital literacy unit in class, leading a library book group, or guiding your homeschoolers through digital dilemmas, the Brain Rot! Education Guide makes it easy to spark critical thinking, ethical reflection, and meaningful conversations about technology and AI.Let your learners cut through the noise-this guide helps them find the signal.

9 特價960
立即代訂
下次再買

Learning Web Design

O'Reilly Me 出版
2025/06/20 出版

Do you want to build web pages but have no prior experience? This friendly guide is the perfect place to start. You'll begin at square one, learning how the web and web pages work, and then steadily build from there. By the end of the book, you'll have the skills to create a simple site with multicolumn pages that adapt for mobile devices. Each chapter provides exercises to help you learn various techniques and short quizzes to make sure you understand key concepts. This thoroughly revised sixth edition is ideal for students and professionals of all backgrounds and skill levels. It's simple and clear enough for beginners yet thorough enough to be a useful reference for experienced developers keeping their skills up-to-date. Build HTML pages with text, links, images, tables, and forms Use style sheets (CSS) for formatting text, colors, backgrounds, page layout, and simple animation effects Use CSS Flexbox and Grid Layout for sophisticated and flexible page designs Learn the ins and outs of responsive web design to make web pages look great on all devices Get an introductory lesson in JavaScript programming, and use it to add functionality to web pages Understand the ways in which JavaScript has become central to the web development workflow Create and optimize web images so they'll download as quickly as possible Get to know the superpowers of the SVG format The sixth edition features a completely rewritten and expanded JavaScript section written by Aaron Gustafson that provides more opportunities to practice writing code.

9 特價2736
加入購物車
下次再買

Innovative Computing 2025, Volume 2

Hao-Shang,Ma  著
Springer 出版
2025/06/20 出版
9 特價9395
立即代訂
下次再買

Introduction to Cryptographic Definitions

Fuchun,Guo  著
Springer 出版
2025/06/18 出版

Cryptographic definitions are often abstract and complex, making them challenging for beginners to understand and apply. This concise textbook/resource provides a structured introduction to cryptographic definitions, explaining the syntax definitions and security definitions of cryptographic primitives. It builds foundational knowledge by covering essential mathematical concepts and formal definitions in cryptology. Through a carefully designed learning curve, readers will grasp key elements, why they are defined this way, and how new definitions are developed. The book's presentation enables readers to validate and propose cryptographic definitions, offering a step-by-step guide to understanding them. Topics and features: - Covers all essential components of cryptographic definitions from sets and functions, making the subject accessible to beginners - Introduces intermediate concepts to smooth the transition from basic principles to formal definitions - Equips readers with the skills to validate and propose cryptographic definitions, linking theory with research - Minimizes unnecessary complexity while retaining depth, thereby ensuring a smooth learning experience Advanced undergraduate students, security engineers, and professionals interested in the formal foundations of cryptographic definitions will find the work an invaluable guide. The text is also an ideal reference for graduate students and early-stage researchers in cryptology and computer security.

9 特價3131
立即代訂
下次再買

The Ultimate ChatGPT Prompt Book

Igor,Pogany  著
2025/06/18 出版

Discover the easiest way to leverage artificial intelligence with these 750+ ready-to-use ChatGPT prompts for common uses such as increasing work productivity, creative writing, fun and entertainment, and more. In this indispensable guide, Igor Pogany, Head of Education and partner of AI Advantage, empowers both newcomers and seasoned experts alike to "speak ChatGPT" with fluency and confidence. Now, interacting with ChatGPT is easier than ever with more than 750 expert-tested prompts for a myriad of practical use-cases. 100+ "cheat sheets" list specific prompts for achieving a given task, along with a prompting formula to help you tailor the prompt to your specific needs. Get equipped with ready-to-use solutions for your everyday challenges such as: -Improving productivity when learning new skills -Preparing schedules, balancing responsibilities, and creating budgets -Crafting compelling narratives and brainstorming creative ideas -Simplifying complex research topics -Considering career viability, preparing for interviews, and crafting persuasive cover letters -Prioritizing health with custom workout and meal plans -Busting boredom with games, jokes, and new movies and music discovery Unlock the immense potential of AI with The Ultimate ChatGPT Prompt Book and join the ranks of enthusiasts who have already revolutionized their lives with ChatGPT's versatility and ease of use.

9 特價547
立即代訂
下次再買

Podcast Studies

2025/06/18 出版

Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in academia, revealing its significant impact on scholarly communication and approaches to research and knowledge creation. This collection presents in-depth analyses from scholars who have integrated podcasting into their academic pursuits. The book systematically explores the medium's implications for teaching, its effectiveness in reaching broader audiences, and its role in reshaping the dissemination of academic work. Covering a spectrum of disciplines, the contributors detail their engagement with podcasting, providing insight into its use as both a research tool and an object of analysis, thereby illuminating the multifaceted ways in which podcasting intersects with and influences academic life. The volume provides substantive evidence of podcasting's transformative effect on academia, offering reflections on its potential to facilitate a more accessible and engaging form of scholarly output. By presenting case studies and empirical research, Podcast Studies: Practice into Theory underscores the originality of podcasting as an academic endeavor and its utility in expanding the reach and impact of scholarly work. It serves as a key resource for academics, researchers, and practitioners interested in the application and study of podcasting as a novel vector for knowledge creation and distribution.

9 特價1822
立即代訂
下次再買

SEO That Gets You Seen

Kevluck 出版
2025/06/17 出版

SEO That Gets You Seen is a field guide for business owners who are tired of being invisible online. Whether you run a local service, an eCommerce shop, or a consulting business, this step-by-step book will help you understand what matters, take action, and finally show up on Google-without wasting time or money.In this practical guide, you'll learn how to: Understand how Google really works-no tech degree requiredFind keywords your customers are actually searching forOptimize your website structure and pages for rankings and conversionsWrite content that brings in leads (not just traffic)Rank higher in local search and Google MapsBuild backlinks the right way-without spam or shady tricksTrack your progress and avoid common SEO pitfallsYou'll also get access to: Clear explanations in plain EnglishChecklists, examples, and step-by-step instructionsA full glossary of terms to demystify the jargonRecommended tools (both free and paid) for every stage of the processWhether you're doing it yourself or managing someone else who is, this book is built for non-technical business owners who need their websites to perform. It cuts through the confusion and gives you a simple system you can apply at your own pace-even if you're short on time.You don't need to become an SEO expert. You just need to understand enough to make it work-and that's exactly what this book will teach you. If you're ready to stop guessing and start getting results, SEO That Gets You Seen is the guide you've been looking for.

9 特價844
立即代訂
下次再買

Principle of Architecture, Protocol, and Algorithms for Cog-Min

Hui,Li  著
Springer 出版
2025/06/16 出版

The Internet is the most important global infrastructure in the digital economy era. Its role has shifted from simple information exchange to support all kinds of novel scenarios and applications. Considering the diverse communication requirements, the development trend of the future network should support various addressing methods, such as IP address, identity, service, content, geographical location, and other potential communication modes. Therefore, a co-governed, secure, and evolvable novel network architecture is indispensable. This Open Access book focuses on Co-Governed Multi-Identifier Network (CoG-MIN), a promising future network architecture that provides an ecological solution for the sustainable evolution of packet networks. The design of CoG-MIN follows three main principles: blockchain-based global co-governed among top-level domains, endogenous network security, and sustainable evolution. CoG-MIN aims to promote peaceful, orderly, secure, and sustainable development for the global computer network. It will end the gridlock in which network systems need to be continuously upgraded due to the exponential scale expansion of addressing and routing on the current network layer. In other words, CoG-MIN enables a variety of networks to coexist and transition naturally. This will save countless establishment costs and take advantage of existing network equipment and devices. This book provides important reference materials about the mentioned topic for the research of computer network, network security, network communication, and other disciplines.

9 特價3131
立即代訂
下次再買

Healing with Artificial Intelligence

CRC Press 出版
2025/06/16 出版

This book explores AI transformative role in healthcare, discussing the practical applications of foundational concepts like Machine Learning and Deep Learning in personalized treatments and virtual care platforms, while highlighting AI potential to revolutionize diagnosis, treatment, and prevention.

9 特價2713
立即代訂
下次再買

Healing with Artificial Intelligence

CRC Press 出版
2025/06/16 出版

This book explores AI transformative role in healthcare, discussing the practical applications of foundational concepts like Machine Learning and Deep Learning in personalized treatments and virtual care platforms, while highlighting AI potential to revolutionize diagnosis, treatment, and prevention.

9 特價4801
立即代訂
下次再買

Advanced Networking Technologies

Yue,Cao  著
2025/06/16 出版

Advanced networking methods and technologies are emerging as critical components in enabling novel applications. They are supported by recent technological advances in wireless communications along with the integration of various functionalities such as sensing, communication and artificial intelligence. The main goal of advanced networking is to achieve more efficient, stable and secure networks in internet and mobile communication systems. To fulfil the increasing network demand from applications, advanced networking technologies such as load balancing, fault tolerance technology, encryption technology, virtualization technology and cloud computing are used to improve network speed, optimize network performance, enhance network security, and provide a better user experience. This book covers innovative advances in networking technologies. The book is written in a tutorial style to benefit a broad advanced research audience in networking, communication, computer science, and security. The authors put a particular focus on cyber security for all advanced network concepts and technologies and have included useful case studies.

9 特價6277
立即代訂
下次再買

Online Hate Speech

Springer 出版
2025/06/13 出版

This book informs readers on how to understand, detect, and mitigate hate speech in online social media. The authors first cover the definition of hate speech and how its prevalence can be measured on online social media platforms using text and graph-based methods. The book then describes the process of detecting hate speech and presents a comprehensive account of the AI models that are currently being used. Further, the authors discuss the associated challenges that must be overcome while using these models. The book concludes with an overview of the mitigation techniques for hate speech, including blocking or suspension of the accounts (hard technique) and counterspeech (soft technique), and a discussion of the effects of these techniques on social media platforms.

9 特價2348
立即代訂
下次再買

Cybersecurity

Springer 出版
2025/06/13 出版

This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18-19, 2025. The 21 full papers and 2 short papers included in these proveedings were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: Artificial intelligence applied to cybersecurity; cybercrime and cyberthreats; cybersecurity; software development security; advances in interdisciplinary cybersecurity: insights from funded reserach projects - CyFRP 2025 special session; complex network analysis for cybersecurity - CNACYS 2025 special session; medical device security and privacy - MeDSec 2025 special session; MDCG guidance; threshold multiparty private set intersection.

9 特價7307
立即代訂
下次再買

ISO/IEC 27001 meets the NIS2 EU Directive - A Practical Guide to Achieving Conformity

Lulu.com 出版
2025/06/12 出版

A structured, erudite, and practical guide for aligning ISO/IEC 27001:2022 with the legal obligations of the NIS2 Directive. Written for CISOs, compliance managers, IT architects, and auditors, this book translates regulatory expectations into actionable frameworks. It offers clear mappings, practical guidance, and strategic insight-supporting both conformity and maturity. Ideal for public institutions and private enterprises navigating Europe's evolving cybersecurity landscape.

9 特價7094
立即代訂
下次再買

ISO/IEC 27001 Meets the SOX 404 Risk Assessment - A Cross-Domain Risk Reference

Lulu.com 出版
2025/06/12 出版

A practical reference for bridging ISO/IEC 27001 and SOX 404. This book offers a clear, structured mapping between information security controls and financial reporting requirements. Designed for professionals navigating both domains, it includes crosswalk tables, annex summaries, and a glossary to support dual compliance. The third in a trilogy alongside the CRA and NIS2 volumes, it serves as a compact yet comprehensive compass for CISO, audit, and GRC teams working across governance frameworks.

9 特價7166
立即代訂
下次再買

Considerate Content

Lulu.com 出版
2025/06/12 出版

Rebekah Barry draws on her experience of doing research with people with wide-ranging needs, showing that accessibility and inclusion are not just tick boxes on a compliance chart. Instead, being considerate of people's different needs is central to making content better for everyone. Whether you're an interaction designer, content creator, policy maker, or educator, this book guides you through how to make your content more inclusive and accessible, with a focus on neurodivergence and health conditions.

9 特價1217
立即代訂
下次再買

Webwork in Action

2025/06/12 出版
9 特價2062
貨到通知
下次再買

Modern Communication with Social Media

Mamta,Dalal  著
2025/06/11 出版

This book explores the evolution of communication, communication media, and covers social media in detail. The book examines some of the most popular social media platforms available today. The book begins with exploring the evolution and history of communication and communication media through the centuries. The book then moves on to introduce social media in detail. It describes some of the most popular social media platforms available today. The book also covers an analysis of various social media management tools. The second edition of the book improves upon the existing content with newer tools and platforms and removes outdated content. It also touches upon cutting-edge topics such as Artificial Intelligence (AI) and its impact on social media, ethics and responsibility in social media, measurement and analytics, and social media marketing and advertising.By the end of this book, readers would be familiar with basics of communication concepts, social media and its features and benefits, working with popular social media platforms such as X, Instagram, Facebook, etc. Readers will also gain insights into advanced concepts like social media ethics, analytics, marketing and the role of AI in shaping the digital landscape. WHAT YOU WILL LEARN● Identify the need for communication.● Trace the history and growth of communication.● Understand the basics of communication.● Identify various forms and types of communication as well as communication channels.● Identify the features and benefits of social media.● Understand the basics of social media platforms.● Gain familiarity with popular social media platforms.● Utilize social media management tools to manage social media platforms.WHO THIS BOOK IS FORThis book is designed to cater to all kinds of audiences, including undergraduates, graduates, and others who are looking to familiarize themselves with communication concepts and social media.

9 特價2193
立即代訂
下次再買

Reengineering Cyber Security Process

de Gruyter 出版
2025/06/11 出版

In today's rapidly evolving information technology landscape, cyber-attacks on company assets and IT systems are becoming increasingly frequent and varied. This book focuses on such security breaches, originating from diverse sources. The book explores the complexities of security attacks and the growing number of vulnerabilities, emphasizing the importance of implementing high-quality information security practices within organizations. It introduces "Reengineering Cyber Security Process: Quality Management", a practical methodology for analyzing various information security components within an organization to develop a comprehensive quality information security management program. This book is valuable for a wide range of professionals in the information security community, including CIOs, CEOs, CISOs, managers, IT staff, professional cybersecurity staff, and end-users. It includes relevant examples and applications, offering a fresh perspective on Cyber Security Quality Management.

9 特價8453
立即代訂
下次再買

Deep Learning Based Solutions for Vehicular Adhoc Networks

Springer 出版
2025/06/10 出版
9 特價13049
貨到通知
下次再買

Advances in the Internet of Things

Qusay,Hassan  著
CRC Press 出版
2025/06/10 出版

Many reports estimate that in 2024, the number of IoT devices exceeded 18 billion worldwide, with predictions to reach 40 billion by 2033. The main objective of this peer-reviewed book is to capture the state-of-the-art in IoT and cover some of its challenges, solutions, and emerging technologies.

9 特價7308
立即代訂
下次再買

An Essay On The Art Of Decyphering

John,Davys  著
2025/06/09 出版

An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breaking. This edition includes a previously unpublished discourse by Dr. Wallis, sourced from his original manuscript housed in the Public Library at Oxford. Authored by John Davys, the essay provides insights into historical methods of decipherment, offering a valuable resource for those interested in the history of secret communication. The book explores the techniques and challenges involved in decoding encrypted messages, shedding light on a fascinating aspect of scientific and linguistic history.This work is essential for cryptographers, historians of science, and anyone curious about the art and science behind deciphering hidden messages. Discover the secrets of the past with An Essay On The Art Of Decyphering.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

An Essay On The Art Of Decyphering

John,Davys  著
2025/06/09 出版

An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breaking. This edition includes a previously unpublished discourse by Dr. Wallis, sourced from his original manuscript housed in the Public Library at Oxford. Authored by John Davys, the essay provides insights into historical methods of decipherment, offering a valuable resource for those interested in the history of secret communication. The book explores the techniques and challenges involved in decoding encrypted messages, shedding light on a fascinating aspect of scientific and linguistic history.This work is essential for cryptographers, historians of science, and anyone curious about the art and science behind deciphering hidden messages. Discover the secrets of the past with An Essay On The Art Of Decyphering.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

Wireshark Cookbook

2025/06/07 出版

���� Unlock the Power of Packet Analysis with the Wireshark Cookbook Series! ��������️]♂️Are you ready to transform from a network novice into a Wireshark wizard? The Wireshark Cookbook: Packet Analysis Bible is your ultimate four-book toolkit, covering every stage of your CLI journey-from basic captures to enterprise-scale automation. Whether you're troubleshooting latency, hunting cyber threats, or automating complex pipelines, these volumes have you covered! ������������ Book 1: Command-Line Essentials for Packet Analysis BeginnersStep-by-step commands for DNS, HTTP, and ARP troubleshooting ����️Extracting IPs, ports, and protocols ����Hands-on tasks to build confidence at the shell prompt���� Book 2: Intermediate CLI Techniques and Custom FiltersCrafting logical and regex filters for TLS, VoIP, DNS-over-HTTPS ����Automating packet summaries in shell pipelines ⚙️Real-world examples to isolate performance or security issues���� Book 3: Advanced Command-Line Scripting and AutomationScheduling hourly captures with cron jobs ⏰Parsing JSON/CSV output into Elasticsearch or databases ����Custom Lua dissectors for proprietary protocols ����Integrating TShark with Zeek, Slack alerts, and more �������� Book 4: Expert-Level CLI Mastery and Performance TuningKernel parameter tweaks (net.core.rmem_max, netdev_max_backlog) ����️CPU affinity, interrupt coalescing, and NUMA considerations ����️Multi-threaded workflows & Spark/Elasticsearch integration ����Storage strategies for terabyte-scale archives and Parquet indexing ����️���� Grab Your Copy Today!Don't let packet analysis intimidate you-master it, automate it, and scale it with the Wireshark Cookbook: Packet Analysis Bible series! �������� Order now and join thousands of network professionals who trust the Wireshark Cookbook to solve real-world network challenges.���� Happy capturing! ����

9 特價1440
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/07 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4697
立即代訂
下次再買

Natural Language Processing and Information Retrieval

Muskan,Garg  著
CRC Press 出版
2025/06/06 出版

This book presents the basics and recent advancements in natural language processing and information retrieval in a single volume. It will serve as an ideal reference text for graduate students and academic researchers in interdisciplinary areas of electrical engineering.

9 特價3705
立即代訂
下次再買

Cyber Security for Next-Generation Computing Technologies

CRC Press 出版
2025/06/05 出版

This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.

9 特價3705
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/05 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價3392
立即代訂
下次再買

AI for Everyday It

2025/06/05 出版

Automate and accelerate your everyday IT tasks with instant solutions! What if you never had to write another after-incident report, piece of boilerplate code, or a performance review from scratch ever again? Use AI tools like ChatGPT, Claude, Gemini, and Copilot right, and you'll take back hours of your time--and more! AI for Everyday IT reveals how you can automate dozens of your daily IT tasks with generative AI. In AI for Everyday IT you'll learn how to: - Write effective prompts for common IT tasks - Optimize report generation, document handling, and workplace communication - Resolve IT conflicts and crises - Acquire new skills and upgrade your resume - AI for help desk, database administration and systems administration - Incorporate AI into DevOps processes and create AI-powered applications - Simplify time-consuming people management tasks In this hands-on guide, automation experts Chrissy LeMaire and Brandon Abshire show you how AI tools like ChatGPT have made their lives a million times easier, and how they can do the same for you. You'll find proven strategies for using AI to improve help desk support, automate sysadmin and database tasks, aid with DevOps engineering, handle managing IT teams, and dozens more time-saving and quality-improving hacks. Foreword by Nitya Narasimhan. About the technology Have you lost days sifting through logs to find a latency issue? AI can do it in seconds! Need to update your documentation? Mere moments for AI. Are you writing scripts, designing data recovery strategies, and evaluating network designs? AI can handle it all--if you know how to use it. About the book AI for Everyday IT shows you exactly how AI can transform support desk operations, root cause analysis, disaster recovery planning--even writing professional emails when you're too furious to be nice! This instantly-useful guide has time-saving techniques for all IT pros--from devs and DBAs to technical writers and product managers. Each relatable example is fully illustrated with the prompts and problem formulation strategies, along with interesting insights and anecdotes from authors Chrissy Lemaire and Brandon Abshire. What's inside - Document handling and workplace communication - Database administration and development - DevOps engineering and AI powered apps - People management and career planning About the reader Whether you're working in operations, development, management, or security, you'll love these productivity hacks for generative AI. No previous AI experience required. About the author Chrissy LeMaire is a dual Microsoft MVP and GitHub Star, the creator of dbatools, and author of the Manning book Learn dbatools in a Month of Lunches. Brandon Abshire has spent over twenty years in IT, including roles at a leading Fortune 500 semiconductor and telecommunications company and multiple top-ranked US hospital systems. Table of Contents Part 1 1 Artificial intelligence in IT 2 Chatbots: Tasks and tips 3 Basic intelligence 4 Prompt engineering and problem formulation 5 Prompts in action 6 Document handling 7 Emails and instant messaging in the workplace Part 2 8 IT support and service desk 9 Systems administration 10 Database administration and development Part 3 11 Code assistants and development tools 12 AI in DevOps engineering 13 Building AI-powered applications Part 4 14 Conflict resolution and crisis management 15 Management essentials 16 Management interventions 17 Career advancement A Local AI models: An accessible alternative B OpenAI GPT Actions Get a free eBook (PDF or ePub) from Manning as well as access to the online liveBook format (and its AI assistant that will answer your questions in any language) when you purchase the print book.

9 特價2294
立即代訂
下次再買

JavaScript for Kids

2025/06/05 出版

Welcome to the book "JavaScript for Kids: Start your Coding Adventure". This book is your introduction to the world of JavaScript. It's your first step towards developing websites and mobile applications. With JavaScript, you can turn your ideas into reality. Learning should be fun, so you will feel like you are reading a story. By the end of this book, you will have a good understanding of JavaScript. You will have taken the first steps in your modern web programming adventure. Have fun programming!

9 特價1481
立即代訂
下次再買

Mastering Network Flow Traffic Analysis

2025/06/05 出版

DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security. Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems.CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.WHAT YOU WILL LEARN● Implement flow analysis across diverse network topologies, and identify blind spots.● Enable flow export from virtualized (VMware, Proxmox) and server environments.● Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.● Analyze flow data using queries for patterns, anomalies, and threat detection.● Understand and leverage the network flow matrix for security, capacity insights.WHO THIS BOOK IS FORThis book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.

9 特價2193
立即代訂
下次再買

Responsive Design

2025/06/05 出版

Welcome to the book "Responsive Design". In this book, I'll introduce you to all the CSS functions you need to create a responsive design. By responsive design, I mean that the website adapts its styles to the display device. So your application changes its layout, alignment, font size, images and even applies different styles for different screen sizes. For example, on wide screens such as TVs, it will display horizontally, while on mobile devices it will switch to a vertical layout. The functions of Responsive CSS include modern layouts such as Flex. This includes media queries, responsive typography and responsive images. It is not possible to list every single detail of all the features in a book, because then the book would be so extensive and you would get bored reading it. There is a wealth of information everywhere. So I'll keep it simple and tell you what you need for your project and try to get you on the right track. Let's go

9 特價932
立即代訂
下次再買

Angular Observables and Promises

2025/06/04 出版

Welcome to the book "Angular Observables and Promises: A Practical Guide to Asynchronous Programming". In this book, I explain how to use observables and promises effectively for asynchronous programming. I show you practical scenarios and explain when you should use them and which operators you need to use. I will give you best practices with important pointers that, when used correctly, can make all the difference and have a big impact on performance. There are also things you should be aware of and avoid when working with observables, otherwise performance can be affected. By the end of this book, you will be able to use Observables and Promises in your Angular application and handle all kinds of scenarios. Let us get started.

9 特價1481
立即代訂
下次再買

Malware Narratives

Opentask 出版
2025/06/03 出版

Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behavior, especially in the pattern-oriented analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a revised and updated transcript of the Software Diagnostics Services seminar on the new application of software narratology to malware analysis.

9 特價1147
立即代訂
下次再買

Cyber Risk Management in Practice

CRC Press 出版
2025/06/03 出版

Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity.

9 特價8352
立即代訂
下次再買

Information Security Governance Using Artificial Intelligence of Things in Smart Environments

CRC Press 出版
2025/06/03 出版

The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments.

9 特價8352
立即代訂
下次再買

Innovations for Community Services

Springer 出版
2025/06/02 出版

This book constitutes the refereed proceedings of the 25th International Conference on Innovations for Community Services, I4CS 2025, held in Munich, Germany, during June 11-13, 2025.The 21 full papers presented in this book together with 3 short papers were carefully reviewed and selected from 55 submissions.They are organized in topical sections as follows: recognition and verification; computational intelligence; data processing; quantum computing; public sector; serious games; information security; and community challenges.

9 特價5219
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/02 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4175
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/02 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4175
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/02 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4697
立即代訂
下次再買

Mastering Deepfake Technology

2025/06/02 出版

This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries, society, and governance. It delves into the multifaceted impacts of synthetic media, examining its potential to reshape corporate trust, economic stability, and public discourse.

9 特價7308
立即代訂
下次再買

Cyber Risk Management in Practice

CRC Press 出版
2025/06/02 出版

Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity.

9 特價3339
立即代訂
下次再買

Metasploit Pentesting

2025/06/02 出版

���� Metasploit Pentesting: Hands-On Offensive Security Suite ����Unlock the ultimate red-team toolkit with our four-volume masterclass on Metasploit, the world's premier penetration-testing framework. Whether you're just starting or an experienced pentester, this suite delivers the skills, scripts, and strategies you need to succeed.���� Book 1 - Mastering Metasploit: From Initial Access to Advanced Payloads- Get Started Fast: Install, configure workspaces & databases - Reconnaissance Made Easy: Scan networks with db_nmap, identify hosts & services - Payload Power: Generate in-memory stagers using msfvenom - Evasion Techniques: Layered encoders, bad-char filters & reflective DLL injection"An essential primer for every aspiring hacker!" - A. Smith, Security Analyst���� Book 2 - Practical Exploitation Techniques with Metasploit Framework- Vulnerability Validation: Safe banner-grab and proof-of-concept - Core Exploits: Buffer overflows, SQLi, XSS, file inclusion & more - Hands-On Labs: Step-by-step walkthroughs, complete with commandsuse exploit/windows/smb/psexec set RHOSTS 10.0.0.5run - Real-Time Debugging: Pry, GDB & proxychains integration"Finally, a book that bridges theory & practice!" - M. Lee, Red Team Lead���� Book 3 - Real-World Penetration Testing: Hands-On Metasploit Scenarios- Complex Networks: Pivot across VLANs with autoroute & portfwd - Web 2.0 Attacks: Automated scanning, CSRF, SSRF & API abuse - Resource Scripts: End-to-end workflows in single .rc files - Post-Exploitation: Credential harvesting, persistence & cleanup"Turned our team into a well-oiled pentesting machine!" - R. Patel, Cyber Ops���� Book 4 - Custom Exploit Development and Evasion Using Metasploit- Module Magic: Build your own auxiliary & exploit modules in Ruby - Advanced Payloads: Custom encoders, in-memory loaders & HTTPS stagers - AV/EDR Bypass: Fileless execution, process hollowing & driver exploits - Automation & API: msgrpc, plugins & continuous integration"A must-have for advanced red-teamers and toolsmiths!" - E. Zhang, CTO���� Ready to Dominate Your Next Engagement? Transform your offensive security game. Add Metasploit Pentesting: Hands-On Offensive Security Suite to your toolkit today and become the pentester everyone fears.���� Get your copy now!

9 特價1440
立即代訂
下次再買

Burp Suite Hacking

2025/05/31 出版

���� BURP SUITE HACKING: FROM RECON TO EXPLOITATION ��������️]♂️�������� Master Web App Hacking in 4 Epic VolumesAre you ready to go from zero to ninja in web application hacking?Want to turn Burp Suite into your ultimate cyber weapon?This 4-book bundle is your complete roadmap to mastering offensive web security using Burp Suite - the most powerful tool trusted by hackers, bug bounty hunters, and pentesters worldwide.���� Book 1: Burp Suite Essentials - Web App Hacking from Zero to Ninja������������]����Start from scratch! Learn how to set up your hacking lab, intercept and manipulate HTTP traffic, use tools like Repeater and Intruder, and understand how web vulnerabilities work from the inside out. Perfect for beginners or those wanting a rock-solid foundation.���� Book 2: Advanced Burp - Weaponizing Your Workflow⚙️����️����Already know the basics? Time to level up. Automate scans with macros and sessions, extend Burp with custom scripts, integrate with external tools, and build blazing-fast workflows. This book turns you into a Burp power user.���� Book 3: Bug Hunter's Playbook - Real-World Exploits with Burp Suite������������Get inside the mind of a real bug bounty hunter. Discover how to find and exploit serious vulnerabilities like XSS, IDOR, SQLi, SSRF, and logic flaws in modern web apps. Learn how to report them like a pro and get paid. These aren't lab examples - they're inspired by real bugs, real rewards, and real success stories.���� Book 4: The Burp Suite Lab Manual - Hands-On Projects for Web Security Testing��������️����Knowledge is nothing without practice. This lab manual gives you full walkthroughs, projects, CTF-style challenges, and vulnerable apps to test your skills. Simulate red team ops, break login systems, abuse tokens, and build attack chains. Perfect for solo learners or team training.���� Who Is This For?✅ Aspiring ethical hackers✅ Bug bounty hunters✅ Security analysts✅ DevSecOps pros✅ Anyone serious about web security���� Why This Series?✔️ Straight to the point - no filler, no fluff✔️ Real commands, real payloads, real labs✔️ Written by hackers, for hackers✔️ Constantly updated for modern web apps����️ Whether you're chasing bounties, securing systems, or just love breaking things to understand how they work, Burp Suite Hacking: From Recon to Exploitation will equip you with the skills, mindset, and tools to own every stage of the attack chain.���� Get all 4 books and go from click to exploit like a pro.���� Your hacking journey starts NOW.������������Grab your copy today! ������������#CyberSecurity #BurpSuite #EthicalHacking #BugBounty #Pentesting #InfoSec #WebAppHacking ����️����

9 特價1440
立即代訂
下次再買

Zero Trust in Resilient Cloud and Network Architectures

Josh,Halley  著
Cisco Press 出版
2025/05/31 出版

Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineers, offers a real-world, hands-on guide to deploying automated architectures with a focus on segmentation at any scale--from proof-of-concept to large, mission-critical infrastructures. Whether you're new to software-defined and cloud-based architectures or looking to enhance an existing deployment, this book will help you: Implement Zero Trust: Segment and secure access while mitigating IoT risks Automate Network Operations: Simplify provisioning, authentication, and traffic management Deploy at scale following best practices for resilient and secure enterprise-wide network rollouts Integrate with Cloud Security, bridging on-prem and cloud environments seamlessly Learn from Real-World Case Studies: Gain insights from the largest Cisco enterprise deployments globally This edition covers Meraki, EVPN, Pub/Sub, and Terraform and Ansible-based deployments with a key focus on network resilience and survivability. It also explores quantum security and Industrial Zero Trust, along with Cisco's latest evolutions in software-defined networking, providing exclusive insights into its enhancements, architecture improvements, and operational best practices. If you're a network, security, or automation specialist, this book is your essential guide to building the next-generation, zero-trust network.

9 特價3671
立即代訂
下次再買

Mastering Palo Alto Networks - Third Edition

Packt 出版
2025/05/30 出版

Unlock the full potential of Palo Alto Networks firewalls with expert insights and hands-on strategies for mastering next-gen securityKey Features: - Master Palo Alto Networks firewalls with hands-on labs and expert guidance- Stay up to date with the latest features, including cloud and security enhancements- Learn how to set up and leverage Strata Cloud Manager- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Mastering Palo Alto Networks is the ultimate guide for anyone looking to become proficient in configuring and managing Palo Alto firewalls. Written by a seasoned security consultant and author with 25 years of expertise in network security, this book provides a comprehensive approach to mastering Palo Alto Networks' firewalls. If you've struggled with managing firewall policies, setting up VPNs, or integrating cloud security, this book will provide clear solutions.You'll get to grips with the fundamentals, and go through the entire process step by step-from initial setup to advanced configurations, gaining a solid understanding of both on-premise and cloud-based security solutions.Packed with practical examples and expert tips, chapters show you how to deploy and optimize firewall policies, secure your network, and troubleshoot issues effectively. With a focus on real-world applications, this guide covers essential topics like traffic management, threat prevention, VPN setup, and integration with Prisma Access for cloud security.By the end of this book, you'll have the confidence and expertise to manage even the most complex network security environments, making this a must-have resource for anyone working with Palo Alto Networks.What You Will Learn: - Set up and configure Palo Alto firewalls from scratch- Manage firewall policies for secure network traffic- Implement VPNs and remote access solutions- Optimize firewall performance and security settings- Use threat prevention and traffic filtering features- Troubleshoot common firewall issues effectively- Integrate Palo Alto firewalls with cloud services- Configure Strata Cloud Manager for network security managementWho this book is for: This book is perfect for network security professionals, IT administrators, and engineers looking to master Palo Alto firewalls. Whether you're new to network security or aiming to deepen your expertise, this guide will help you overcome configuration challenges and optimize security. Basic networking knowledge is required, but no prior experience with Palo Alto is necessary.Table of Contents- Understanding the Core Technologies- Setting Up a New Device- Building Strong Policies- Taking Control of Sessions- Services and Operational Modes- Identifying Users and Controlling Access- Managing Firewalls through Panorama- Managing Firewalls through Strata Cloud Manager- Upgrading Firewalls and Panorama- Logging and Reporting- Virtual Private Networks and Advanced Protection- Troubleshooting Common Session Issues- A Deep Dive into Troubleshooting- Cloud-Based Firewall Deployments

9 特價2294
立即代訂
下次再買

Learning Go with Networking

2025/05/30 出版

DESCRIPTION Golang has emerged as a powerful language for networking, known for its efficiency and concurrency, making it ideal for building resilient and scalable network applications. This book is designed to equip networking professionals with the Golang skills needed to navigate this dynamic landscape, providing a practical guide from fundamental concepts to advanced network programming.This book systematically guides you through Golang's core features, including concurrency, generics, and error handling, before diving into essential networking principles like IP, TCP, and UDP. You will learn to develop applications, design synchronous and asynchronous APIs (with a focus on Ponzu and Keycloak), and effectively handle data using formats like JSON and XML, along with stream processing with AMQP, Kafka, and MQTT. The book explores Golang network packages for protocols such as ARP, FTP, DNS, and raw sockets. It also emphasizes performance optimization, covering I/O, caching, and database techniques, and automation strategies, including device, network, and cloud deployment, along with Cisco DevNet. Security is thoroughly addressed, covering authentication, cryptography (SSL/TLS, asymmetric/symmetric), certificate handling, and OWASP Top 10 vulnerabilities, and the book concludes with an exploration of network penetration testing techniques.By the end of this book, readers will gain a solid foundation in Golang and its application to networking, enabling them to build efficient, secure, and automated network solutions and understand the security landscape, from defensive best practices to offensive techniques.WHAT YOU WILL LEARN● Build scalable backend services using Go and its libraries.● Understand TCP/UDP networking through real Go-based examples.● Develop secure APIs with authentication and token handling.● Automate infrastructure tasks using Golang and DevNet.● Identify and fix OWASP Top 10 vulnerabilities in Go.WHO THIS BOOK IS FORThis book is for software developers, DevOps engineers, backend architects, and cybersecurity professionals who want to build scalable, secure, and efficient systems using Golang. It is ideal for anyone working in infrastructure, automation, or cloud-native development looking to sharpen their development skills in Golang with respect to network programming.

9 特價2193
立即代訂
下次再買
頁數11/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing