0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

Learning Go with Networking

2025/05/30 出版

DESCRIPTION Golang has emerged as a powerful language for networking, known for its efficiency and concurrency, making it ideal for building resilient and scalable network applications. This book is designed to equip networking professionals with the Golang skills needed to navigate this dynamic landscape, providing a practical guide from fundamental concepts to advanced network programming.This book systematically guides you through Golang's core features, including concurrency, generics, and error handling, before diving into essential networking principles like IP, TCP, and UDP. You will learn to develop applications, design synchronous and asynchronous APIs (with a focus on Ponzu and Keycloak), and effectively handle data using formats like JSON and XML, along with stream processing with AMQP, Kafka, and MQTT. The book explores Golang network packages for protocols such as ARP, FTP, DNS, and raw sockets. It also emphasizes performance optimization, covering I/O, caching, and database techniques, and automation strategies, including device, network, and cloud deployment, along with Cisco DevNet. Security is thoroughly addressed, covering authentication, cryptography (SSL/TLS, asymmetric/symmetric), certificate handling, and OWASP Top 10 vulnerabilities, and the book concludes with an exploration of network penetration testing techniques.By the end of this book, readers will gain a solid foundation in Golang and its application to networking, enabling them to build efficient, secure, and automated network solutions and understand the security landscape, from defensive best practices to offensive techniques.WHAT YOU WILL LEARN● Build scalable backend services using Go and its libraries.● Understand TCP/UDP networking through real Go-based examples.● Develop secure APIs with authentication and token handling.● Automate infrastructure tasks using Golang and DevNet.● Identify and fix OWASP Top 10 vulnerabilities in Go.WHO THIS BOOK IS FORThis book is for software developers, DevOps engineers, backend architects, and cybersecurity professionals who want to build scalable, secure, and efficient systems using Golang. It is ideal for anyone working in infrastructure, automation, or cloud-native development looking to sharpen their development skills in Golang with respect to network programming.

9 特價2193
立即代訂
下次再買

Mastering Palo Alto Networks - Third Edition

Packt 出版
2025/05/30 出版

Unlock the full potential of Palo Alto Networks firewalls with expert insights and hands-on strategies for mastering next-gen securityKey Features: - Master Palo Alto Networks firewalls with hands-on labs and expert guidance- Stay up to date with the latest features, including cloud and security enhancements- Learn how to set up and leverage Strata Cloud Manager- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Mastering Palo Alto Networks is the ultimate guide for anyone looking to become proficient in configuring and managing Palo Alto firewalls. Written by a seasoned security consultant and author with 25 years of expertise in network security, this book provides a comprehensive approach to mastering Palo Alto Networks' firewalls. If you've struggled with managing firewall policies, setting up VPNs, or integrating cloud security, this book will provide clear solutions.You'll get to grips with the fundamentals, and go through the entire process step by step-from initial setup to advanced configurations, gaining a solid understanding of both on-premise and cloud-based security solutions.Packed with practical examples and expert tips, chapters show you how to deploy and optimize firewall policies, secure your network, and troubleshoot issues effectively. With a focus on real-world applications, this guide covers essential topics like traffic management, threat prevention, VPN setup, and integration with Prisma Access for cloud security.By the end of this book, you'll have the confidence and expertise to manage even the most complex network security environments, making this a must-have resource for anyone working with Palo Alto Networks.What You Will Learn: - Set up and configure Palo Alto firewalls from scratch- Manage firewall policies for secure network traffic- Implement VPNs and remote access solutions- Optimize firewall performance and security settings- Use threat prevention and traffic filtering features- Troubleshoot common firewall issues effectively- Integrate Palo Alto firewalls with cloud services- Configure Strata Cloud Manager for network security managementWho this book is for: This book is perfect for network security professionals, IT administrators, and engineers looking to master Palo Alto firewalls. Whether you're new to network security or aiming to deepen your expertise, this guide will help you overcome configuration challenges and optimize security. Basic networking knowledge is required, but no prior experience with Palo Alto is necessary.Table of Contents- Understanding the Core Technologies- Setting Up a New Device- Building Strong Policies- Taking Control of Sessions- Services and Operational Modes- Identifying Users and Controlling Access- Managing Firewalls through Panorama- Managing Firewalls through Strata Cloud Manager- Upgrading Firewalls and Panorama- Logging and Reporting- Virtual Private Networks and Advanced Protection- Troubleshooting Common Session Issues- A Deep Dive into Troubleshooting- Cloud-Based Firewall Deployments

9 特價2294
立即代訂
下次再買

Redefining Information Security

Brian,Wagner  著
Kogan Page 出版
2025/05/29 出版

Is your security strategy keeping pace with innovation and business growth? Redefining Information Security by Brian Wagner is a strategic guide for CISOs, CIOs, CTOs and senior technology leaders looking to reposition cybersecurity as a driver of enterprise value. Going beyond reactive models, it shows how security can enable innovation, unlock agility and support long-term transformation. Bringing together leadership, implementation and cultural change, this book offers practical guidance for building resilient, business-aligned security strategies that scale. You'll learn how to: - Align security with technology roadmaps, enterprise goals and innovation agendas - Turn risk into a competitive advantage with advanced mitigation frameworks - Build a proactive, security-driven culture across functions and teams - Apply proven strategies from real-world examples - Strengthen resilience while navigating an evolving threat and tech landscape Discover how security can evolve to meet the challenges of tomorrow's digital landscape with Redefining Information Security and equip yourself with the tools to lead securely and strategically. Themes include: security strategy, digital transformation, risk leadership, cybersecurity culture, enterprise architecture, innovation enablement

9 特價2276
立即代訂
下次再買

A Simple Guide to Retrieval Augmented Generation

2025/05/29 出版

Everything you need to know about Retrieval Augmented Generation in one human-friendly guide. Augmented Generation--or RAG--enhances an LLM's available data by adding context from an external knowledge base, so it can answer accurately about proprietary content, recent information, and even live conversations. RAG is powerful, and with A Simple Guide to Retrieval Augmented Generation, it's also easy to understand and implement! In A Simple Guide to Retrieval Augmented Generation you'll learn: - The components of a RAG system - How to create a RAG knowledge base - The indexing and generation pipeline - Evaluating a RAG system - Advanced RAG strategies - RAG tools, technologies, and frameworks A Simple Guide to Retrieval Augmented Generation gives an easy, yet comprehensive, introduction to RAG for AI beginners. You'll go from basic RAG that uses indexing and generation pipelines, to modular RAG and multimodal data from images, spreadsheets, and more. About the Technology If you want to use a large language model to answer questions about your specific business, you're out of luck. The LLM probably knows nothing about it and may even make up a response. Retrieval Augmented Generation is an approach that solves this class of problems. The model first retrieves the most relevant pieces of information from your knowledge stores (search index, vector database, or a set of documents) and then generates its answer using the user's prompt and the retrieved material as context. This avoids hallucination and lets you decide what it says. About the Book A Simple Guide to Retrieval Augmented Generation is a plain-English guide to RAG. The book is easy to follow and packed with realistic Python code examples. It takes you concept-by-concept from your first steps with RAG to advanced approaches, exploring how tools like LangChain and Python libraries make RAG easy. And to make sure you really understand how RAG works, you'll build a complete system yourself--even if you're new to AI! What's Inside - RAG components and applications - Evaluating RAG systems - Tools and frameworks for implementing RAG About the Readers For data scientists, engineers, and technology managers--no prior LLM experience required. Examples use simple, well-annotated Python code. About the Author Abhinav Kimothi is a seasoned data and AI professional. He has spent over 15 years in consulting and leadership roles in data science, machine learning and AI, and currently works as a Director of Data Science at Sigmoid. Table of Contents Part 1 1 LLMs and the need for RAG 2 RAG systems and their design Part 2 3 Indexing pipeline: Creating a knowledge base for RAG 4 Generation pipeline: Generating contextual LLM responses 5 RAG evaluation: Accuracy, relevance, and faithfulness Part 3 6 Progression of RAG systems: Na簿ve, advanced, and modular RAG 7 Evolving RAGOps stack Part 4 8 Graph, multimodal, agentic, and other RAG variants 9 RAG development framework and further exploration Get a free eBook (PDF or ePub) from Manning as well as access to the online liveBook format (and its AI assistant that will answer your questions in any language) when you purchase the print book.

9 特價2294
立即代訂
下次再買

Mastering Microsoft 365 Security Technologies

2025/05/29 出版

DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape.This book will introduce readers to Microsoft security solutions. It covers Microsoft Defender, Microsoft Entra ID, and Microsoft Purview. Readers will learn how they can protect their organization across different attack vectors such as email, identity, data, endpoints, and applications. It discusses how to protect the user identities using Microsoft Entra ID, protect devices and applications using Microsoft Defender and Microsoft Sentinel, and protect organization data using Microsoft Purview. With a focus on real-world scenarios, hands-on labs, and expert guidance, cybersecurity professionals will gain a deep understanding of Microsoft security solutions and how to use them to protect their organizations from bad actors. By the end of this book, you will possess the practical knowledge and skills to design, implement, and manage a strong security posture across your organization's Microsoft infrastructure, confidently protecting identities, data, and applications from modern cyberattacks.WHAT YOU WILL LEARN● Data security and governance using Microsoft Purview information protection and DLP.● Protecting devices, identities, M365, and non-M365 applications using Microsoft Defender.● Microsoft's Zero Trust Network Access solution - secure services edge.● Manage Entra ID users, groups, RBAC, Admin Units, Protected Actions effectively.● Managing regulatory compliance and privacy.WHO THIS BOOK IS FORThis book is ideal for IT professionals and administrators seeking careers in security administration using Microsoft security technologies. Readers need foundational cloud computing knowledge (IaaS, PaaS, SaaS), basic M365 cloud and Azure familiarity, plus awareness of Zero Trust, identity and access, and platform protection.

9 特價2193
立即代訂
下次再買

Cracking

2025/05/29 出版

���� Unleash Your Inner Hacker with "Cracking: Red Team Hacking"! ����️����Are you ready to dive deep into the world of offensive security? Cracking: Red Team Hacking is your ultimate guide to mastering the four powerhouse pentesting distributions: ���� Kali Linux - The industry standard for penetration testing, loaded with Metasploit, Nmap, Burp Suite, and hundreds more tools. Learn how to configure, customize, and conquer every engagement.���� Parrot OS - A nimble, privacy-first alternative that balances performance with stealth. Discover built-in sandboxing, AnonSurf integration, and lightweight workflows for covert ops.����️ BackBox - Ubuntu-based stability meets pentest prowess. Seamlessly install meta-packages for web, wireless, and reverse-engineering testing, all wrapped in a polished XFCE desktop.⚔️ BlackArch - Arch Linux's rolling-release power with 2,500+ specialized tools at your fingertips. From RFID to malware analysis, build bespoke toolchains and automate complex workflows.Why You Need This Book ����Hands-On Tutorials: Step-by-step guides-from initial OS install to advanced exploit chaining-that you can follow in real time.Custom Toolchains: Learn to curate and automate your perfect toolkit with Docker, Ansible, and Packer recipes.Real-World Scenarios: Walk through cloud attacks, wireless exploits, and container escapes to sharpen your red team skills.OSINT & Social Engineering: Integrate reconnaissance tools and phishing frameworks for full-spectrum assessments.Persistence & Post-Exploitation: Master C2 frameworks (Empire, Cobalt Strike, Sliver) and implant stealthy backdoors.What You'll Walk Away With ����Confidence to choose the right distro for every engagementVelocity to spin up environments in minutesPrecision in tool selection and workflow automationStealth for covert operations and anti-forensicsExpertise to beat blue team defenses and secure real-world networks���� Order Today and start cracking the code of modern security! ����✨

9 特價1164
立即代訂
下次再買

Where Matters

Ali,Youssef  著
CRC Press 出版
2025/05/28 出版

In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary framework that brings the precision and reliability of aviation traffic control to healthcare operations.

9 特價8352
立即代訂
下次再買

Where Matters

Ali,Youssef  著
CRC Press 出版
2025/05/28 出版

In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary framework that brings the precision and reliability of aviation traffic control to healthcare operations.

9 特價3339
立即代訂
下次再買

AI Powered Secure Software Engineering

2025/05/27 出版

In a world where financial systems are under constant threat, AI-Powered Secure Software Engineering offers a practical, no-fluff guide to building software that not only performs-but protects. Drawing from years of real-world experience at the intersection of fintech, AI, and cybersecurity, Gbenga Akingbulere unpacks the principles, challenges, and strategic decisions behind secure software in high-stakes environments. This is not just a technical manual-it's a roadmap for engineers, DevOps teams, and fintech leaders who are serious about trust, resilience, and intelligent defense.Gbenga Akingbulere is a software engineer specialist with deep expertise in designing AI-powered financial systems. Known for his hands-on approach and clarity of thought, Gbenga has led the development of fraud detection systems that scale, adapt, and secure critical platforms in real time. His work bridges the gap between engineering theory and operational impact, helping teams embed security as a core function-not an afterthought.

9 特價917
立即代訂
下次再買

Cisa Certified Information Systems Auditor Practice Tests

Wiley 出版
2025/05/27 出版

Improve your understanding of every CISA exam domain and objectives to further your career in information security auditing CISA Certified Information Systems Auditor Practice Tests provides essential and practical exam prep for the popular CISA certification. Hundreds of domain-by-domain practice questions cover all of the tested Certified Information Systems Auditor exam objectives, helping you prepare for the test and for the real-world demands of a career in systems audit, security, and control. Just like the real exams, the practice questions written by veteran information security experts Peter Gregory and Mike Chapple cover the information system auditing process, the governance and management of IT, information systems acquisition, development, and implementation, information systems operations and business resilience, and the protection of information assets. These rigorous and realistic practice questions will get you ready whether this is your first role in the industry or if you are experienced and ready to advance your career. By studying the domain-by-domain questions and well as taking the full chapter practice exams, you'll get help in identifying your subject-matter strengths and weaknesses and be ready to shift from topic to topic in an exam-like setting. In the book, you'll get: Challenging questions designed to advance your understanding and comprehension of all covered exam domains Questions as similar as possible to the real CISA exam questions Complimentary access to online version of the same questions to practice your online test-taking skills Perfect for everyone studying for the CISA Certified Information Systems Auditor certification exam, this book will also benefit IT security professionals seeking to test and improve their skillset.

9 特價1903
貨到通知
下次再買

Digital Forensics and Cyber Crime

Sanjay,Goel  著
Springer 出版
2025/05/26 出版

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

9 特價3392
立即代訂
下次再買

Cybersecurity in IoT Networks

Scholars' Press 出版
2025/05/26 出版

Cyber security is essential in the IoT because one threat or hack could disrupt the network - or worse, give a cyber criminal complete access to the entire system. In industries such as defense or military operations, the IoT houses extremely sensitive information. If the IoT is accessed via a weak network point or vulnerable device, hackers then have the ability to retrieve intelligence or cause physical damage to the entire network. While businesses, government and health care sectors have increasingly reaped the benefits of the IoT, this shift to interconnectedness also has raised the stakes in terms of risk and the potential financial and security damage that can occur from a hack. The more devices that are added to a network, the greater number of opportunities cyber criminals are granted for "entrances" to the data. This book has four chapters, including: Chapter I, Security and the Internet of Things;Chapter II, Future Industry Internet of Things with Zero-trust Security;Chapter III, Benefits of IoT for Business;Chapter IV, Internet of Things (IoT) Security Challenges in 2025 and References.

9 特價3396
立即代訂
下次再買

LLM Design Patterns

Ken,Huang  著
Packt 出版
2025/05/26 出版

Explore reusable design patterns, including data-centric approaches, model development, model fine-tuning, and RAG for LLM application development and advanced prompting techniquesKey Features: - Learn comprehensive LLM development, including data prep, training pipelines, and optimization- Explore advanced prompting techniques, such as chain-of-thought, tree-of-thought, RAG, and AI agents- Implement evaluation metrics, interpretability, and bias detection for fair, reliable models- Print or Kindle purchase includes a free PDF eBookBook Description: This practical guide for AI professionals enables you to build on the power of design patterns to develop robust, scalable, and efficient large language models (LLMs). Written by a global AI expert and popular author driving standards and innovation in Generative AI, security, and strategy, this book covers the end-to-end lifecycle of LLM development and introduces reusable architectural and engineering solutions to common challenges in data handling, model training, evaluation, and deployment.You'll learn to clean, augment, and annotate large-scale datasets, architect modular training pipelines, and optimize models using hyperparameter tuning, pruning, and quantization. The chapters help you explore regularization, checkpointing, fine-tuning, and advanced prompting methods, such as reason-and-act, as well as implement reflection, multi-step reasoning, and tool use for intelligent task completion. The book also highlights Retrieval-Augmented Generation (RAG), graph-based retrieval, interpretability, fairness, and RLHF, culminating in the creation of agentic LLM systems.By the end of this book, you'll be equipped with the knowledge and tools to build next-generation LLMs that are adaptable, efficient, safe, and aligned with human values.What You Will Learn: - Implement efficient data prep techniques, including cleaning and augmentation- Design scalable training pipelines with tuning, regularization, and checkpointing- Optimize LLMs via pruning, quantization, and fine-tuning- Evaluate models with metrics, cross-validation, and interpretability- Understand fairness and detect bias in outputs- Develop RLHF strategies to build secure, agentic AI systemsWho this book is for: This book is essential for AI engineers, architects, data scientists, and software engineers responsible for developing and deploying AI systems powered by large language models. A basic understanding of machine learning concepts and experience in Python programming is a must.Table of Contents- Introduction to LLM Design Patterns- Data Cleaning for LLM Training- Data Augmentation- Handling Large Datasets for LLM Training- Data Versioning- Dataset Annotation and Labeling- Training Pipeline- Hyperparameter Tuning- Regularization- Checkpointing and Recovery- Fine-Tuning- Model Pruning- Quantization- Evaluation Metrics- Cross-Validation- Interpretability- Fairness and Bias Detection- Adversarial Robustness- Reinforcement Learning from Human Feedback- Chain-of-Thought Prompting- Tree-of-Thoughts Prompting- Reasoning and Acting- Reasoning WithOut Observation- Reflection Techniques- Automatic Multi-Step Reasoning and Tool Use- Retrieval-Augmented Generation- Graph-Based RAG- Advanced RAG- Evaluating RAG Systems- Agentic Patterns

9 特價2523
立即代訂
下次再買

Digital Forensics and Cyber Crime

Sanjay,Goel  著
Springer 出版
2025/05/26 出版

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

9 特價5219
立即代訂
下次再買

Code-Based Cryptography

Springer 出版
2025/05/26 出版

This book constitutes the refereed proceedings of the 12th International Conference on Code-Based Cryptography, CBCrypto 2024, held in Zurich, Switzerland, during May 25-26, 2024. The 5 full papers presented in this book were carefully reviewed and selected from 41 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

9 特價6263
立即代訂
下次再買

Security and Privacy

Springer 出版
2025/05/24 出版

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy, ICSP 2024, held in Jamshedpur, India, during November 20-21, 2024. The 12 full papers and 1 short paper included in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: Cryptanalysis and Other Attacks; Boolean Functions; Authentication and authorization, Cyber-physical systems security, Privacy-preserving technologies; Blockchain and Cryptocurrency, IoT security and privacy, Database security; Quantum Cryptography.

9 特價3392
立即代訂
下次再買

Optimized Deep Learning for Network Intrusion Detection

2025/05/23 出版

This book targets young researchers exploring advanced network security techniques to counter evolving cyber threats. It presents innovative methods, including RNN-based cyber-attack detection and IDS with feature reduction. Additionally, it introduces optimization-driven deep learning models like DASO-Deep RNN, ADASO-Deep RNN, and Opt RCNN-LSTM for precise intrusion detection, ensuring high accuracy, sensitivity, and specificity.

9 特價4131
立即代訂
下次再買

The Neural Network Revolution

2025/05/23 出版

This book provides a comprehensive exploration of deep learning, starting with the basics of neural networks, including the perceptron algorithm and key techniques like feed-forward and backpropagation, optimization, and regularization. It delves into deep learning foundations, covering important concepts such as gradient descent, backpropagation, and solutions for challenges like the vanishing gradient problem. The book then introduces convolutional neural networks (CNNs), explaining their architectures, convolution and pooling layers, and applications like transfer learning for image classification. Further, it covers advanced deep learning architectures such as LSTMs, GRUs, and autoencoders, including various types like sparse, denoising, and adversarial generative networks. Finally, the book discusses a wide range of applications in deep learning, from image processing and segmentation to object detection, video-to-text generation, and dialogue systems using LSTMs, providing both theoretical understanding and practical insights for implementing deep learning models.

9 特價4131
立即代訂
下次再買

Evaluation of Clustering Techniques for News Recommendation

2025/05/23 出版

The information overloading is one of the most significant issues nowadays. It can be seen in different domains, consisting of business, particularly in news. This is more important in link to news websites and web, where the news websites reliability is typically determined by quantity of news added to the portal. Then the most popular news websites include numerous of news articles daily. The classical solution generally used to address the information overloading is a recommendation. In this book we evaluate the MapReduce k-means and fuzzy k-means clustering for a content-based recommendation for news articles, based on Euclidian distance and cosine similarity search. This approach consists of two phases of operation.

9 特價2295
立即代訂
下次再買

Leveraging Artificial Intelligence and Machine Learning

2025/05/23 出版

As cybersecurity threats continue to evolve in sophistication, velocity, and impact, the conventional reactive security approaches cannot keep up with them. In these cases, cyber attackers have employed more sophisticated strategies such as polymorphic malware, fileless attacks, and living-off-the-land techniques that do not depend on traditional detection methods. Anticipating this, predictive risk looking (more notably using artificial intelligence (AI) and machine learning) has emerged as a key technology in today's cybersecurity strategies. Predictive risk finding allows security teams to proactively detect hidden risks, spot anomalies, and anticipate adversary behaviours before it results in a breach or device compromise. AI/ML approaches leverage behavioural analytics, large-scale telemetry data, and real-time learning to uncover overlooked patterns often missed by human analysts or rule-based architectures. In this article, we provide an exclusive overview of today's cutting-edge AI and ML applications in predictive risk looking. We focus on core technologies, device architectures, algorithmic models, and industry specific implementations.

9 特價2295
立即代訂
下次再買

Cybersecurity Explained

Anders Askasen 出版
2025/05/23 出版

Cybersecurity Explained is a comprehensive and accessible guide designed to equip readers with the knowledge and practical insight needed to understand, assess, and defend against today's evolving cyber threats. Covering 21 structured chapters, this book blends foundational theory with real-world examples-each chapter ending with review questions to reinforce key concepts and support self-paced learning.Topics include: Chapter 1-2: An introduction to cybersecurity and the threat landscape, including threat actors, attack vectors, and the role of threat intelligence.Chapter 3: Social engineering tactics and defense strategies.Chapter 4-5: Cryptography fundamentals and malware types, vectors, and defenses.Chapter 6-7: Asset and vulnerability management, including tools and risk reduction.Chapter 8: Networking principles and network security across OSI and TCP/IP models.Chapter 9: Core security principles such as least privilege, defense in depth, and zero trust.Chapter 10: Identity and access management (IAM), including IGA, PAM, and modern authentication.Chapter 11: Data protection and global privacy regulations like GDPR, CCPA, and sovereignty issues.Chapter 12-13: Security frameworks (NIST, ISO, CIS Controls) and key cybersecurity laws (NIS2, DORA, HIPAA).Chapter 14-16: Penetration testing, incident response, and business continuity/disaster recovery.Chapter 17-18: Cloud and mobile device security in modern IT environments.Chapter 19-21: Adversarial tradecraft (OPSEC), open-source intelligence (OSINT), and the dark web.Written by Anders Ask疇sen, a veteran in cybersecurity and identity governance, the book serves students, professionals, and business leaders seeking practical understanding, strategic insight, and a secure-by-design mindset.

9 特價2052
立即代訂
下次再買

Lila and Andy learn about Artificial Intelligence

2025/05/22 出版

Are you curious about artificial intelligence? Discover how Large Language Models work with an AI book made just for kids.Lila and Andy Learn About Artificial Intelligence: Discover Large Language Models and Prompt Engineering is the latest title in the Lila and Andy Learn STEM education picture book series. This engaging and educational book introduces young readers to the fascinating world of AI, focusing on large language models and the basics of prompt engineering.Through simple explanations, relatable examples, and creative comparisons, readers learn how LLMs "guess" what comes next in a sentence, how prompts help shape the answers AI gives, and how to talk to AI like a pro. With clear, friendly guidance from Lila and Andy, kids build a strong foundation in a fast-changing digital world.Perfect for classrooms, homeschool lessons, or curious readers at home, this book supports STEM learning by introducing modern AI technologies in a way kids can truly understand. It's ideal for parents, teachers, and educators who want trusted, up-to-date resources that reflect the world kids are growing up in.Packed with colorful illustrations and practical examples, the STEM book helps kids explore cutting-edge technology with confidence and excitement.Get your copy today and help the next generation of smart kids learn the language of tomorrow.

9 特價761
立即代訂
下次再買

Acting, Planning, and Learning

2025/05/22 出版

AI's next big challenge is to master the cognitive abilities needed by intelligent agents that perform actions. Such agents may be physical devices such as robots, or they may act in simulated or virtual environments through graphic animation or electronic web transactions. This book is about integrating and automating these essential cognitive abilities: planning what actions to undertake and under what conditions, acting (choosing what steps to execute, deciding how and when to execute them, monitoring their execution, and reacting to events), and learning about ways to act and plan. This comprehensive, coherent synthesis covers a range of state-of-the-art approaches and models -deterministic, probabilistic (including MDP and reinforcement learning), hierarchical, nondeterministic, temporal, spatial, and LLMs -and applications in robotics. The insights it provides into important techniques and research challenges will make it invaluable to researchers and practitioners in AI, robotics, cognitive science, and autonomous and interactive systems.

9 特價6682
立即代訂
下次再買

Teaching Using AI

John,King  著
Books Explorer 出版
2025/05/21 出版

Who This Book Is ForThe Curious But Overwhelmed: You've heard AI is a big deal but don't know where to start.The Career Pivoters: You want AI skills to stay relevant (or finally get that raise).The "I Hate Math" Crowd: Terms like "neural networks" make you sweat.The DIYers: You learn by doing, not memorizing theory."If you've ever Googled 'AI for beginners' and closed the tab in frustration-this book is your revenge."Why AI is the Skill of the FutureThe Job Market is Obsessed with AI60% of jobs will be AI-augmented by 2030 (McKinsey).Translation: Your boss will soon ask, "Can you AI this?"AI is the New LiteracyLike Excel in the '90s or social media in the 2010s-not knowing AI will feel like illiteracy.It's Not Just for Tech NerdsTeachers use AI for lesson plans.Artists use it to prototype designs.Your industry is next.Hard Truth: "AI won't replace you-but someone using AI might."What You'll Walk Away WithBy the end of this book, you'll: ✅ Build 5 Real AI Projects (From a meme generator to a spam filter-no prior skills needed).✅ Speak AI Without Sounding Like a Robot (Finally understand what "LLM" or "GPT" means).✅ Spot AI BS (Know when companies are exaggerating their "revolutionary AI").✅ Automate Your Work/Life (Use AI to draft emails, sort photos, or even plan meals).✅ Laugh at Your Mistakes (With a community of fellow learners who also trained AI to call cats "bread").Most Importantly: "You'll go from 'AI is magic' to 'I can break this'-the most powerful mindset in tech."

9 特價2522
立即代訂
下次再買

Information Management and Big Data

Springer 出版
2025/05/20 出版

This book constitutes the proceedings of the 11th Annual International Conference on Information Management and Big Data, SIMBig 2024, held in Ilo, Peru, during November 20-22, 2024. The 27 full papers and 1 short paper included in this book were carefully reviewed and selected from 102 submissions. They were organized in topical sections as follows: machine learning and deep learning; natural language processing; mining of social networks and online platforms; and signal and image processing.

9 特價4436
立即代訂
下次再買

Soft Computing and Its Engineering Applications

Springer 出版
2025/05/20 出版

The two-volume proceedings set CCIS 2430-2431 constitutes the revised selected papers of the 6th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2024, held in Bangkok, Thailand, during December 10-12, 2024. The 58 full papers and 3 short papers included in this book were carefully reviewed and selected from 501 submissions. They were organized in topical sections as follows: Part I: Theory and Methods.Part II: Theory and Methods; Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.

9 特價6263
立即代訂
下次再買

Attack Surface Management

Ron,Eddings  著
O'Reilly Media 出版
2025/05/20 出版

Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats. The process covers all security aspects, from daily operations and threat hunting to vulnerability management and governance. You'll learn: Fundamental ASM concepts, including their role in cybersecurity How to assess and map your organization's attack surface, including digital assets and vulnerabilities Strategies for identifying, classifying, and prioritizing critical assets Attack surfaces types, including each one's unique security challenges How to align technical vulnerabilities with business risks Principles of continuous monitoring and management to maintain a robust security posture Techniques for automating asset discovery, tracking, and categorization Remediation strategies for addressing vulnerabilities, including patching, monitoring, isolation, and containment How to integrate ASM with incident response and continuously improve cybersecurity strategies ASM is more than a strategy--it's a defense mechanism against growing cyber threats. This guide will help you fortify your digital defense.

9 特價2052
立即代訂
下次再買

AppSec Mastery

Fawzooz.AI 出版
2025/05/18 出版

In an era where information is the cornerstone of any organization, securing it is paramount. "AppSec Mastery" is an essential guide born from the critical need to address the evolving challenges of the digital age. Drawing from extensive firsthand experience as a Chief Information Security Officer (CISO), Mohamed Fawzi Elgendi offers a comprehensive handbook for navigating the complexities of integrating robust information security practices within software development processes.

9 特價2295
立即代訂
下次再買

Intelligent Video Analytics

2025/05/18 出版

Intelligent Video Analytics is a guide to mastering modern surveillance technology. This reference covers everything from the basics of CCTV systems to the latest advances in video analytics, making it an essential resource for networking and security professionals. Part I, Foundations of CCTV Technology, explains the fundamentals of CCTV cameras, lenses, recording devices, monitors, and network design and security. Part II, Camera and Sensor Technologies discusses various camera types, image sensors, and image processing principles and optics. Part III, Advanced Concepts in Computer Vision and Deep Learning, covers CNNs, object detection, tracking, face recognition, and video content analysis. Part IV, Computing Technologies for Video Analytics, studies the essentials of GPUs, CPUs, and edge computing. Part V, Enhancing Security, Safety, and Operational Efficiency," examines the principles of physical security, and operational efficiency. In Part VI, Designing Video Analytics Platforms, covers designing robust video analytics systems with applications for smart cities and law enforcement. Part VII, The Future of Video Analytics with Generative AI," considers the role of generative AI in anomaly detection and video synthesis.

9 特價1710
立即代訂
下次再買

ICT Systems Security and Privacy Protection

Springer 出版
2025/05/17 出版

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

9 特價6263
立即代訂
下次再買

Systematic Security

Timur,Qader  著
CRC Press 出版
2025/05/16 出版

Systematic Security: A CISO's Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation.

9 特價8352
立即代訂
下次再買

AI-Enabled Threat Intelligence and Cyber Risk Assessment

CRC Press 出版
2025/05/16 出版

AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.

9 特價8352
立即代訂
下次再買

Defending the Metaverse

Ravi,Sheth  著
Ingram 出版
2025/05/16 出版

Defending the Metaverse is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.

9 特價8352
立即代訂
下次再買

Prompt

Suraj,Sheikh  著
SS Publication 出版
2025/05/16 出版
9 特價622
立即代訂
下次再買

DDoS

Stefan,Behte  著
Ingram 出版
2025/05/15 出版

Distributed Denial of Service (DDoS) attacks are frequently taking down websites and are making headlines. But how exactly do these attacks work? How is it possible to defend against them? Is it even possible? DDoS mitigation providers often take lengths to publicly explain how dangerous new types of attacks are, but hardly ever describe typical mitigation steps except: "just use our services". This book will help readers better understand the technical details of DDoS attacks and give step-by-step guidance in how to defend against them. Key topics are: Introduction to DDoS and its history, Network basics needed to understand DDoS, Datacenter technologies and their relevance, Attack origins of DDoS, Deep-dive into attacks and their mitigation, Designing DDoS mitigation systems, Active network self-defense and Internet hygiene, Introduction to the economical side of DDoS attacks The book features an appendix with DDoS risk and mitigation readiness assessments and several labs you can configure to gain first-hand experience on attack and defense.

9 特價2871
立即代訂
下次再買

Systematic Security

Timur,Qader  著
Ingram 出版
2025/05/15 出版

Systematic Security: A CISO's Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation.

9 特價3339
立即代訂
下次再買

Security Technologies for Law Enforcement Agencies

Ingram 出版
2025/05/15 出版

"Security Technologies for Law Enforcement Agencies" offers a comprehensive examination of the tools, systems, and concepts that form the foundation of modern security infrastructures.

9 特價3600
立即代訂
下次再買

AI-Enabled Threat Intelligence and Cyber Risk Assessment

CRC Press 出版
2025/05/15 出版

AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.

9 特價3600
立即代訂
下次再買

Distributed Computer and Communication Networks

Springer 出版
2025/05/14 出版

The proceedings constitute papers presented in the 27th International Conference, DCCN 2024, held in Moscow, Russia, during September 23-27, 2024. The 11 full papers and 1 short paper included in this book were carefully reviewed and selected from 90 submissions. They were organized in topical sections as follows: Computer and Communication Networks; Analytical Modeling of Distributed Systems; Distributed Systems Applications.

9 特價3392
貨到通知
下次再買

Would You Date Your Website?

2025/05/14 出版

If your website were a person, what kind of impression would they make on a date?Most people have had or heard about an awful dating experience (or been one!). How does your website stack up? Is it attractive to the people you're interested in?Does it make them want to spend their time? Or are there red flags pushing people away? Things like cluttered pages, broken links, confusing navigation, or slow load times. A bad experience has a greater impact than you think. "Their website sucks. The company probably does too." A small misstep is all it takes-it can rob you of the chance to tell someone why you're a good fit and earn their trust.Because interactions may be entirely online, your website is you, your business, your reputation. That puts a lot of pressure on your site to start a relationship on the right foot, nurture it, and keep it strong over the long term. Whether you're building a new website, have an older one you want to breathe life into (and avoid a redesign), or a new site that isn't generating the leads or sales it should, this book is for you. I'll help you craft a website that attracts the people you're interested in, and entices them to start-and stay-in a relationship. A website they'd like to date.

9 特價855
立即代訂
下次再買

Learn React Hooks - Second Edition

Daniel,Bugl  著
Packt 出版
2025/05/14 出版

Grasp the core concepts of React Hooks and enhance your development workflow with best practices and advanced patterns derived from modern React 19 featuresKey Features: - Build custom Hooks to simplify complex logic and promote code reusability- Transform class components into modern, hook-based function components, and write robust tests- Build maintainable, production-ready UIs using React 19's declarative approach and ecosystem tools- Purchase of the print or Kindle book includes a free PDF eBookBook Description: React Hooks allow you to easily encapsulate, reuse, and refactor logic with the same level of simplicity that components bring to user interface organization.In this second edition, React expert and author of many popular React books, Daniel Bugl guides you through the full spectrum of React Hooks, and teaches you how to handle forms, routing, and data fetching in modern React development. This edition is fully updated to React 19, with a revamped structure, expanded real-world use cases, and coverage of all newly introduced Hooks.Starting with the fundamentals, you'll gain a deep understanding of how Hooks work under the hood and how to apply Hooks patterns efficiently. The chapters guide you through using State, Reducer, and Effect Hooks to manage application state, side effects, and complex logic for building your first Hook-based app. You'll utilize Suspense and Context APIs for streamlined data fetching and state management, master Form Actions for handling submissions, and implement routing with Hooks. You'll also create custom Hooks for advanced functionality and write tests for reliability. Finally, you'll learn how to refactor an existing app with class components into modern Hooks architecture.By the end of this React book, you'll be well-equipped to use React Hooks to modernize and optimize your React projects.What You Will Learn: - Master and apply new React 19 Hooks, such as useActionState, useFormStatus, useOptimistic, and others- Use React Hooks and Context to manage state in your web applications- Efficiently fetch, update, and cache data using TanStack Query and Suspense- Manage user input and form submission using Form Actions with Hooks- Discover how to implement routing in your apps using React Router and Hooks- Create and test your own Hooks to encapsulate, reuse, and refactor logic in your appsWho this book is for: This book is ideal for React developers looking to modernize their applications using React Hooks, Context, and Suspense. Beginners and experienced developers alike will gain a solid understanding of Hooks and their internal workings. If you're familiar with React and JavaScript, this book will help you upskill by teaching you best practices, performance optimization, and scalable application building. No prior experience with Hooks is required-this book covers everything from fundamentals to advanced patterns.Table of Contents- Introducing React and React Hooks- Using the State Hook- Writing Your First Application with React Hooks- Using the Reducer and Effect Hooks- Implementing React Contexts- Using Hooks and React Suspense for Data Fetching- Using Hooks for Handling Forms- Using Hooks for Routing- Advanced Hooks Provided by React- Using Community Hooks- Rules of Hooks- Building Your Own Hooks- Migrating from React Class Components

9 特價1926
立即代訂
下次再買

The Web, A Multilingual Encyclopedia

Marie,Lebert  著
Alpha Edition 出版
2025/05/13 出版

Unlock the secrets of the digital age with "The Web: A Multilingual Encyclopedia" by Marie Lebert, a timeless masterpiece that was out of print for decades and is now beautifully republished by Alpha Editions. This collector's item is not just a reprint; it's a cultural treasure, meticulously restored for today's and future generations. Dive into the fascinating evolution of the internet, as Lebert expertly weaves together a tapestry of knowledge that transcends language and borders. This unique volume offers an unparalleled exploration of the web's impact on global communication, education, and culture. Whether you're a casual reader or a classic literature collector, you'll be captivated by the book's insightful analysis and visionary perspective. "The Web" is more than just an encyclopedia; it's a journey through the digital revolution that continues to shape our world. Don't miss your chance to own a piece of history that celebrates the power of connectivity and the enduring value of knowledge.

9 特價865
立即代訂
下次再買

Modern Web Apps using Rust

Nira,Talvyn  著
Gitforgits 出版
2025/05/13 出版

This book introduces you to web development with Rust and Leptos. To begin with, you install a solid Rust toolchain and set up Leptos in VS Code, and then you see your first "Hello World" interface rendered via WebAssembly right away. So, first you'll design a microservice-inspired book-selling sample app, called LibroCommerce, into inventory, orders, and user accounts. Then, you'll connect each piece with Axum handlers, SQLx queries, and shared Serde models.By the time you get to Chapter 3, you'll have built a nonblocking, Tokio-driven server that handles dynamic routes, powers Leptos SSR pages, and secures endpoints with JWT and OAuth2. Then, you add real-time features: WebSockets send stock updates and order-status events to reactive Leptos signals, keeping the UI and backend in sync. As you go, you'll be writing end-to-end Playwright tests and setting up GitHub Actions so that every commit runs Rust tests, Playwright scenarios, Docker builds, and Kubernetes rollouts automatically. You'll learn how to connect to PostgreSQL with an async pool, model Books, Users, and Orders with Serde-annotated Rust structs, and implement CRUD, password hashing with Argon2, encrypted backups, and session stores in Redis. Performance tuning shows you how to optimize Tokio threads, tune SQLx pools, stream large result sets, debounce client inputs, and apply backpressure. At last, you put each microservice and frontend into Docker containers, deploy them with Kubernetes, and then use serverless.It's packed with over 100 bite-sized examples and ready-to-run solutions, and it'll walk you through building and operating a production-style web application in Rust, step-by-step. You won't become a Rust language expert, but you'll finish ready to design, code, test, and deploy modern web apps.Key Learnings Start using Rust and Leptos with VS Code to develop web applications using WebAssembly.Architect microservices with inventory, orders, and user modules for modular, scalable applications.Make servers that respond to user activity and are not blocked by other users. Use Tokio and Axum with dynamic routing and concurrency.Employ business logic with SQLX, transactions, and external API integration for real-world workflows.Protect your devices with JWT, OAuth2, Argon2 password hashing, HttpOnly cookies, and TLS encryption.Handle database state asynchronously, define Serde data models, and perform efficient CRUD operations.Utilize WebSockets, Leptos signals, and broadcast channels to enable real-time updates.Perform end-to-end testing with Playwright, integration tests, and automated CI pipelines for reliability.Put microservices and the frontend into containers using Docker, and use Kubernetes to orchestrate them so they can be deployed without any downtime.Table of Content Setting up Rust & Leptos EnvironmentDesigning Modern ArchitectureBuilding Application ServerDatabase Integration and State ManagementModern Interactions with REST, GraphQL, and OAuthFront-end Development with Leptos and WebAssemblyReal-time Interactions using WebsocketModern Security, Performance, and Cloud StrategiesCloud-native Releases and Continuous Delivery

9 特價2394
立即代訂
下次再買

Holistic IoT Security, Privacy and Safety

Now Publishers 出版
2025/05/13 出版

The Internet of Things (IoT) is rapidly transforming our world, connecting billions of devices and enabling unprecedented levels of automation, data exchange, and convenience. From smart homes and wearable fitness trackers to industrial sensors and connected cars, IoT devices are permeating every aspect of our lives. However, this widespread adoption has also introduced significant security challenges that must be addressed to ensure the safety and privacy of individuals and organizations.The ERATOSTHENES project, funded by the European Commission, rises to meet these challenges by developing a novel Trust and Identity Management Framework for IoT devices. This framework takes a holistic approach to IoT security, considering the entire lifecycle of devices from initial deployment to decommissioning. Designed to be distributed, automated, auditable, and privacy-respectful, the ERATOSTHENES framework empowers users with control over their data and strengthens trust and resilience within the IoT ecosystem. By leveraging cutting-edge technologies like blockchain, advanced cryptography, and machine learning, ERATOSTHENES provides a comprehensive suite of security mechanisms to address the evolving threats and vulnerabilities in the IoT landscape.This book dives into the territory of the ERATOSTHENES project, providing a detailed exploration of its technical architecture, implementation, and real-world applications. It examines the key challenges addressed by the project, including the heterogeneity of IoT devices, the management of device identities, and the protection of user privacy. The book also highlights the innovative solutions developed within ERATOSTHENES, such as the Trust Manager & Broker, the Self-Sovereign Identity system, and the Advanced Data Protector. Furthermore, it showcases the practical implementation of these and other research solutions and outcomes through pilot projects in diverse domains, including connected vehicles, remote patient monitoring, and industrial network security.This book serves as a valuable resource for researchers, practitioners, and policymakers seeking to understand and address the complex security challenges of the IoT. It offers insights into the latest advancements in IoT security technologies and provides a roadmap for building a more secure and trustworthy IoT ecosystem.

9 特價6862
立即代訂
下次再買

Cryptography for Payment Professionals

2025/05/12 出版

The book is a one-stop source for cryptographic methods used in payment technologies in major global markets: legacy magnetic stripe (e.g., EMV, 3DS 2.0, DUKPT). It provides a broad overview of the relevant cryptographic algorithms and methods, putting them in context for various payment processing aspects and security standards.

9 特價3496
立即代訂
下次再買

Cyber Insecurity

CRC Press 出版
2025/05/12 出版

Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation.

9 特價3600
立即代訂
下次再買

Manifesting Violence

2025/05/10 出版

Exposes how white supremacist groups exploit digital platforms to radicalize individualsManifesting Violence: White Terrorism, Digital Culture, and the Rhetoric of Replacement by Casey Ryan Kelly and William Joseph Sipe is a compelling exploration of how the digital world has become a fertile ground for white supremacist ideology. Through an in-depth analysis of white supremacist manifestos, online rhetoric, and the myth of "white genocide," Kelly and Sipe uncover the disturbing ways in which digital culture facilitates the spread of racist ideology and the radicalization of individuals. By examining the language of white nationalism--calls to defend the white race, family, and children--Kelly and Sipe reveal how these messages, often disguised as entertainment or humor, gradually transform passive consumers into active participants in a dangerous ideology. Manifesting Violence sheds light on the alarming shift from organized white supremacist groups to a decentralized digital arena where hate speech is disguised as humor and online conversations foster a culture of violence. Kelly and Sipe's thorough investigation of this growing digital ecosystem offers a chilling glimpse into the dark underbelly of online extremism. A must-read for anyone seeking to understand the growing threat of hate-motivated violence and the urgent need to address its roots in digital culture, Kelly and Sipe offer rich insights to readers, researchers, academics, and policymakers concerned about extremism, online radicalization, and white supremacy.

9 特價5742
貨到通知
下次再買

Public-Key Cryptography - Pkc 2025

Tibor,Jager  著
Springer 出版
2025/05/09 出版

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in R繪ros, Norway, during May 12-15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

9 特價4175
立即代訂
下次再買
頁數12/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing