0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

Communication and Relationships

Ingram 出版
2025/01/26 出版
9 特價2386
立即代訂
下次再買

A Certificate Verification System for Institutions

Ingram 出版
2025/01/26 出版
9 特價2111
立即代訂
下次再買

Transformer, Bert, and Gpt

Ingram 出版
2025/01/26 出版
9 特價2017
立即代訂
下次再買

Generative AI for Everyone

Ingram 出版
2025/01/26 出版
9 特價2193
立即代訂
下次再買

Securing IoT in Industry 4.0 Applications with Blockchain

P,Kaliraj  著
2025/01/25 出版

Industry 4.0 is an amalgam of smart factories, cognitive computing, cloud computing, Internet of Things (IoT), and cyber-physical systems. The IoT component is highly networked and vulnerable to attack. This book examines the role of IoT in Industry 4.0 and how it can be made secure through various technologies including blockchain.

9 特價3861
立即代訂
下次再買

Security and Trust Management

Springer 出版
2025/01/24 出版

This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19-20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.

9 特價2870
貨到通知
下次再買

Global Internet of Things and Edge Computing Summit

Springer 出版
2025/01/24 出版

This Open Access book constitutes the proceedings from the First Global Internet of Things and Edge Computing Summit, GIECS 2024, held in September 24-25, 2024, in Brussels, Belgium. The 12 full papers presented here were carefully reviewed and selected from 21 submissions. These papers have been organized under the following topical sections: Industrial Internet of Things (IIoT) and Digital Twins; Data Management, Privacy, and Trust in Distributed Systems; Edge Computing and Cross-Domain Systems.

9 特價2348
立即代訂
下次再買

Cyber Security Threats and Challenges Facing Human Life

Ingram 出版
2025/01/23 出版

This book proposes to provide a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain with a detailed analysis of effective countermeasures and mitigations. It is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals working in the area.

9 特價3339
立即代訂
下次再買

Navigating the Cyber Maze

Ingram 出版
2025/01/22 出版

In an era where cyber threats loom larger than ever, Navigating the Cyber Maze offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity. This book aims to provide readers with a comprehensive understanding of cybersecurity, extending far beyond traditional IT concerns.

9 特價3600
立即代訂
下次再買

Modern Angular

2025/01/22 出版
9 特價2294
貨到通知
下次再買

Understanding the Technology Behind Online Offending

Routledge 出版
2025/01/22 出版

Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.

9 特價1826
立即代訂
下次再買

Network Analysis using OPNET Simulator for OSPF, EIGRP & IGRP Protocols

Ingram 出版
2025/01/21 出版
9 特價1698
立即代訂
下次再買

Interconnecting Remote Sites Over the Internet Using a Dmvpn Network

Ingram 出版
2025/01/18 出版
9 特價2065
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2025/01/16 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

The Art of Cyber Security

Gary,Hibberd  著
Ingram 出版
2025/01/14 出版
9 特價2538
立即代訂
下次再買

Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education

Ingram 出版
2025/01/13 出版

Healthcare organizations and institutions of higher education have become prime targets of increased cyberattacks. This book explores current cybersecurity trends and effective software applications, AI, and decision-making processes to combat cyberattacks. It emphasizes the importance of compliance, provides downloadable digital forensics software, and examines the psychology of organizational practice for effective cybersecurity leadership.Since the year 2000, research consistently reports devasting results of ransomware and malware attacks impacting healthcare and higher education. These attacks are crippling the ability for these organizations to effectively protect their information systems, information technology, and cloud-based environments. Despite the global dissemination of knowledge, healthcare and higher education organizations continue wrestling to define strategies and methods to secure their information assets, understand methods of assessing qualified practitioners to fill the alarming number of opened positions to help improve how cybersecurity leadership is deployed, as well as improve workplace usage of technology tools without exposing these organizations to more severe and catastrophic cyber incidents.This practical book supports the reader with downloadable digital forensics software, teaches how to utilize this software, as well as correctly securing this software as a key method to improve usage and deployment of these software applications for effective cybersecurity leadership. Furthermore, readers will understand the psychology of industrial organizational practice as it correlates with cybersecurity leadership. This is required to improve management of workplace conflict, which often impedes personnel's ability to comply with cybersecurity law and policy, domestically and internationally.

9 特價6786
立即代訂
下次再買

Advanced Malware Analysis and Intelligence

Ingram 出版
2025/01/13 出版
9 特價2193
立即代訂
下次再買

Learning Php, MySQL & JavaScript

Nixon  著
Ingram 出版
2025/01/10 出版

Build interactive, data-driven websites with the potent combination of open source technologies and web standards, even if you have only basic HTML knowledge. With the latest edition of this popular hands-on guide, you'll tackle dynamic web programming using the most recent versions of today's core technologies: PHP, MySQL, JavaScript, CSS, HTML5, jQuery, Node.js, and the powerful React library. Web designers will learn how to use these technologies together while picking up valuable web programming practices along the way, including how to optimize websites for mobile devices. You'll put everything together to build a fully functional social networking site suitable for both desktop and mobile browsers. Explore MySQL from database structure to complex queries Use the MySQL PDO extension, PHP's improved MySQL interface Create dynamic PHP web pages that tailor themselves to the user Manage cookies and sessions and maintain a high level of security Enhance JavaScript with the React library Use Ajax calls for background browser-server communication Style your web pages by acquiring CSS skills Implement HTML5 features including geolocation, audio, video, and the canvas element Reformat your websites into mobile web apps

9 特價2052
立即代訂
下次再買

Fun with Designing

Vinay,Bhatt  著
Ingram 出版
2025/01/10 出版
9 特價423
立即代訂
下次再買

Network Communication Protocols

Ghassan,Abed  著
Ingram 出版
2025/01/10 出版
9 特價3534
立即代訂
下次再買

Cybersecurity and Data Science Innovations for Sustainable Development of Heicc

Ingram 出版
2025/01/07 出版

Delves into the nexus of cybersecurity, data science, and sustainable development in a variety of areas. The book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cyber security and data science in the pursuit of sustainable development across HEICC domains.

9 特價8613
立即代訂
下次再買

Don't Be the Weakest Link

Ingram 出版
2025/01/07 出版

Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape.Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link!

9 特價684
立即代訂
下次再買

Waves of Trust

Ingram 出版
2025/01/07 出版

The title of this book accurately reflects the figure of Rino Falcone, a scientist whose contributions have provided important insights into several central themes of research, with particular reference to the fields of agent theory, multi-agent systems, and artificial intelligence. Alongside Cristiano Castelfranchi, Rino Falcone has made a fundamental contribution to understanding and systematizing the concept of trust in human interactions, in the relationship between humans and technology, and in interactions between humans and artificial intelligent agents. Throughout his work, Falcone has consistently prioritized a broad interdisciplinary theoretical analysis, focused especially on the search for regulatory principles that transcend mere application domains.His scientific production has always been accompanied by a passionate socio-political commitment, which has decisively marked the history of the Institute of Cognitive Sciences and Technologies (ISTC-CNR), of which he has been a part since its inception and which he directed for nearly 9 years, and more broadly of Italian research. In addition to leading the ISTC, Falcone has held numerous prominent institutional roles, successfully advocating for a vision of science as a driver of social progress.Through a series of contributions and testimonies from eminent Italian and international scientists, politicians, and public figures whose experiences have intersected with those of Rino Falcone, this volume seeks to explore the implications of his scientific activity and also aims to delve into profound reflection on the dynamic relationship between science, society, and politics. In an era of profound technological transformations like the one we are experiencing, Rino Falcone has positioned himself as a figure capable of uniting scientific rigor with the ability to promote deep and current reflection on the role of science as a paradigm in the construction of a more just, sustainable, and humane society.

9 特價1377
立即代訂
下次再買

Ghidra Software Reverse-Engineering for Beginners - Second Edition

Packt 出版
2025/01/07 出版

Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey Features: - Make the most of Ghidra on different platforms such as Linux, Windows, and macOS- Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting- Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Written by David ?lvarez P矇rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges.By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.What You Will Learn: - Develop and integrate your own Ghidra extensions- Discover how to use Ghidra in headless mode- Extend Ghidra for advanced reverse-engineering- Perform binary differencing for use cases such as patch and vulnerability analysis- Perform debugging locally and in a remote environment- Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware- Automate vulnerability detection in executable binaries using Ghidra scriptingWho this book is for: This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended.Table of Contents- Getting Started with Ghidra- Automating RE Tasks with Ghidra Scripts- Ghidra Debug Mode- Using Ghidra Extensions- Reversing Malware Using Ghidra- Scripting Malware Analysis- Using Ghidra's Headless Analyzer- Binary Diffing- Auditing Program Binaries- Scripting Binary Audits- Developing Ghidra Plugins- Incorporating New Binary Formats- Analyzing Processor Modules- Contributing to the Ghidra Community- Extending Ghidra for Advanced Reverse-Engineering- Debugging- Unpacking in-the-Wild Malware- Reverse-Engineering Ransomware

9 特價2064
立即代訂
下次再買

Industrial Internet of Things

Silky,Goel  著
Ingram 出版
2025/01/06 出版

Industrial Internet of Things: An Introduction explores the convergence of IoT and machine learning technologies in transforming industries and advancing economic growth. This comprehensive guide examines foundational principles, innovative applications, and real-world case studies that showcase the power of IoT-enabled intelligent systems in enhancing efficiency, sustainability, and adaptability.The book is structured into five parts. The first part introduces industrial IoT concepts, including algorithms, deep learning prediction models, and smart production techniques. The second section addresses machine learning and collaborative technologies, focusing on artificial neural networks, and AI's role in healthcare and industrial IoT. Subsequent chapters explore real-world applications, such as IoT adoption in healthcare during COVID-19 and intelligent transportation systems. The final sections address advanced IIoT progressions and the role of IoT in energy production using byproducts. Key Features: - Foundational concepts and algorithms for industrial IoT.- Integration of machine learning in IoT systems.- Case studies on healthcare, transportation, and sustainability.- Insights into energy production using IoT.

9 特價2495
立即代訂
下次再買

Deconstructing Digital Capitalism and the Smart Society

Ingram 出版
2025/01/04 出版

Today's critics of big online platforms tend to consider privacy breaches, monopolistic practices, and the deployment of surveillance technologies as the main problems. Internet reformers suggest the answers to these issues reside in more--and better--regulations. While the questions of privacy, data, and size are indeed important, they are secondary however to a deeper set of concerns about platform ownership and control, and who benefits from the current status quo. This book examines these issues and offers an historical overview and in-depth analysis of digital capitalism and its prevailing practices as it has become increasingly intertwined with various forms of online surveillance, behavior modification, and the delegation of managerial functions to algorithmic and automated systems in platform economies. The approach taken extends to the wider array of data-driven, internet-connected and automated systems that involve digital devices and technologies centered on three "smart" spaces: the smart self, the smart home, and the smart city. Antitrust and other regulatory measures by the European Union and the United States that are aimed at restraining platform capitalism are also discussed. The focus in particular is on recent developments regarding artificial intelligence and their potentially harmful implications. This is followed by a critical look at proposals for more far-reaching institutional reforms revolving around the creation of forms of "platform socialism" that build partly on existing practices of platform cooperativism. The book concludes with a diagnosis of the global situation among the competing "digital empires" (the United States, the European Union, and China), and considers whether or not, under the present conditions, any form of democratic platform socialism could materialize on a wider scale in the near future.

9 特價3802
立即代訂
下次再買

Machine Learning with PyTorch and Scikit-Learn

Packt 出版
2025/01/03 出版

This book of the bestselling and widely acclaimed Python Machine Learning series is a comprehensive guide to machine and deep learning using PyTorch's simple to code framework.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesLearn applied machine learning with a solid foundation in theoryClear, intuitive explanations take you deep into the theory and practice of Python machine learningFully updated and expanded to cover PyTorch, transformers, XGBoost, graph neural networks, and best practicesBook DescriptionMachine Learning with PyTorch and Scikit-Learn is a comprehensive guide to machine learning and deep learning with PyTorch. It acts as both a step-by-step tutorial and a reference you'll keep coming back to as you build your machine learning systems.Packed with clear explanations, visualizations, and examples, the book covers all the essential machine learning techniques in depth. While some books teach you only to follow instructions, with this machine learning book, we teach the principles allowing you to build models and applications for yourself.Why PyTorch?PyTorch is the Pythonic way to learn machine learning, making it easier to learn and simpler to code with. This book explains the essential parts of PyTorch and how to create models using popular libraries, such as PyTorch Lightning and PyTorch Geometric.You will also learn about generative adversarial networks (GANs) for generating new data and training intelligent agents with reinforcement learning. Finally, this new edition is expanded to cover the latest trends in deep learning, including graph neural networks and large-scale transformers used for natural language processing (NLP).This PyTorch book is your companion to machine learning with Python, whether you're a Python developer new to machine learning or want to deepen your knowledge of the latest developments.What you will learnExplore frameworks, models, and techniques for machines to 'learn' from dataUse scikit-learn for machine learning and PyTorch for deep learningTrain machine learning classifiers on images, text, and moreBuild and train neural networks, transformers, and boosting algorithmsDiscover best practices for evaluating and tuning modelsPredict continuous target outcomes using regression analysisDig deeper into textual and social media data using sentiment analysisWho this book is forIf you have a good grasp of Python basics and want to start learning about machine learning and deep learning, then this is the book for you. This is an essential resource written for developers and data scientists who want to create practical machine learning and deep learning applications using scikit-learn and PyTorch.Before you get started with this book, you'll need a good understanding of calculus, as well as linear algebra.Table of ContentsGiving Computers the Ability to Learn from DataTraining Simple Machine Learning Algorithms for ClassificationA Tour of Machine Learning Classifiers Using Scikit-LearnBuilding Good Training Datasets - Data PreprocessingCompressing Data via Dimensionality ReductionLearning Best Practices for Model Evaluation and Hyperparameter TuningCombining Different Models for Ensemble LearningApplying Machine Learning to Sentiment AnalysisPredicting Continuous Target Variables with Regression AnalysisWorking with Unlabeled Data - Clustering AnalysisImplementing a Multilayer Artificial Neural Network from Scratch(N.B. Please use the Look Inside option to see further chapters)

9 特價3671
立即代訂
下次再買

The Chief AI Officer's Handbook

Packt 出版
2025/01/03 出版

Empower your leadership with this detailed guide for CAIOs and business leaders to drive innovation, address complex challenges, and implement ethical AI strategiesKey Features: - Explore practical frameworks for effective AI team building and team management- Implement and Optimize AI Agents and Agentic Systems through design and implementation of AI agents.- Gain actionable advice for leveraging AI to drive innovation and strategic growth- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Chief Artificial Intelligence Officers (CAIOs) are now imperative for businesses, enabling organizations to achieve strategic goals and unlock transformative opportunities through the power of AI. By building intelligent systems, training models to drive impactful decisions, and creating innovative applications, they empower organizations to thrive in an AI-driven world. Written by Jarrod Anderson, Chief AI Officer at SYRV.AI, this book bridges the gap between visionary leadership and practical execution.This handbook reimagines AI leadership for today's fast-paced environment, leveraging predictive, deterministic, generative, and agentic AI to address complex challenges and foster innovation. It provides CAIOs with the strategies to develop transformative AI initiatives, build and lead elite teams, and adopt AI responsibly while maintaining compliance. From shaping impactful solutions to achieving measurable business outcomes, this guide offers a roadmap for making AI your organization's competitive edge.By the end of this book, you'll have the knowledge and tools to excel as a Chief AI Officer, driving innovation, strategic growth, and lasting success for your organization.What You Will Learn: - Develop and execute AI strategy as a CAIO, ensuring ethical compliance- Master agile AI project management from ideation to deployment- Apply deterministic and probabilistic AI concepts through case studies- Design and implement AI agents for autonomous system optimization- Create human-centered AI systems using proven design principles- Enhance AI security through data privacy and model protection measuresWho this book is for: This book is for chief AI officers, business leaders, AI and data science professionals, IT managers, entrepreneurs, consultants, academic leaders, policymakers, and general business professionals. This diverse audience seeks to understand not only the technical intricacies of AI, but also how to leverage AI to solve real-world business problems, drive innovation, and achieve strategic goals.Table of Contents- Why Every Company Needs a Chief AI Officer- Key Responsibilities of a Chief AI Officer- Crafting a Winning AI Strategy- Building High-Performing AI Teams- Data - the Lifeblood of AI- AI Project Management- Understanding Deterministic, Probabilistic, and Generative AI- AI Agents and Agentic Systems- Designing AI Systems- Training AI Models- Deploying AI Solutions- AI Governance and Ethics- Security in AI Systems- Privacy in the Age of AI- AI Compliance- Conclusion- Appendix

9 特價2294
立即代訂
下次再買

Privacy in Vehicular Networks

Baihe,Ma  著
Ingram 出版
2025/01/03 出版

In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge. This book delves into the complexities of protecting sensitive location data within the dynamic and decentralized environment of vehicular networks.

9 特價3600
立即代訂
下次再買

Information and communication techniques course 4th year

Ingram 出版
2025/01/03 出版

Our aim in writing this book for fourth-year Humanities Science students is to support the national curriculum for this option, which is rich in Information and Communication Technologies (ICT). In this book, we have developed related notions on computer networks, social networks, client-server systems, artificial intelligence and other notions oriented towards different algorithms. The book is based on the national curriculum for the year 2021.It should also be pointed out that this book has been written with a great deal of courage and love, in order to raise the level of knowledge of our science option students and bring up to date our ICT teachers who have not been able to tackle their computer studies up to degree level.

9 特價3809
立即代訂
下次再買

Mobile Communication Systems for Private Networks

Ingram 出版
2025/01/02 出版

Understand the role of network communications in the private sector with this timely guide 4G and 5G wireless communication technologies have come to dominate network communications in recent years, and their expansion is only continuing. Most existing treatments of this key subject, however, deal with large-scale public networks, not the private networks whose deployment constitutes one of the major current growth areas in wireless technology. There is an urgent need for a guide to network communication deployment specifically for private enterprises. Fundamentals of Private Cellular Enterprise Network Communications meets this need with a cutting-edge but accessible overview of the subject. Alerting to the specific needs of the private enterprise network and the disruption potential of cellular network operations, it surveys the early lessons of the global private network rollout for the benefit of future operations. With an eye towards future challenges and developments, this essential text is suitable for professionals in the network communications industry and its partners. Readers will also find: The background required to design, deploy, and manage enterprise private networks driven by 4G and 5G technologies apart from interworking and co-existence aspects with Wi-Fi (it can be an independent bullet as well) Detailed discussion of topics including fundamentals of 4G & 5G, standards bodies and their role in defining specifications for private networks, layer 3 concepts, IP connectivity, and many more Solutions to the urgent need for ubiquitous 5-bar connectivity both indoors and outdoor Fundamentals of Private Cellular Enterprise Network Communications is an ideal reference for end user devices, network operators, chip manufacturers, researchers, and all other professionals and stakeholders with roles in the information and operational technology industries.

9 特價6426
立即代訂
下次再買

Current and Future Cellular Systems

Ingram 出版
2025/01/02 出版

Comprehensive reference on the latest trends, solutions, challenges, and future directions of 5G communications and beyond 5G for Future Generation Communication Systems covers the state of the art in architectures and solutions for 5G wireless communication and beyond. This book is unique because instead of focusing on singular topics, it considers various technologies being used in conjunction with 5G and beyond 5G technologies. All new and emerging technologies are covered, along with their problems and how quality of service (QoS) can be improved with respect to future requirements. This book highlights the latest trends in resource allocation techniques due to different device (or user) characteristics, provides a special focus on wide bandwidth millimeter wave communications including circuitry, antennas, and propagation, and discusses the involvement of decision-making processes assisted by artificial intelligence/machine learning (AI/ML) in applications such as resource allocation, power allocation, QoS improvement, and autonomous vehicles. Readers will also learn to develop mathematical modeling, perform simulation setup, and configure parameters related to simulations. 5G for Future Generation Communication Systems includes information on: The Internet of Vehicles (IoV), covering requirements, challenges, and limitations of Cellular Vehicle-to-Everything (C-V2X) with Resource Allocation (RA) techniques Intelligent reflecting surfaces, unmanned aerial vehicles, power optimized frameworks, challenges in a sub-6 GHz band, and communication in a THz band The role of IoT in healthcare, agriculture, smart home applications, networking requirements, and the metaverse Quantum computing, cloud computing, spectrum sharing methods, and performance analysis of WiFi 6/7 for indoor and outdoor environments Providing expansive yet accessible coverage of the subject by exploring both basic and advanced topics, 5G for Future Generation Communication Systems serves as an excellent introduction to the fundamentals of 5G and its applications for graduate students, researchers, and industry professionals in the field of wireless communication technologies.

9 特價6196
立即代訂
下次再買

Security and Privacy in New Computing Environments

Jun,Cai  著
Springer 出版
2025/01/02 出版

This book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023. The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics.

9 特價4436
立即代訂
下次再買

Data Management and Security in Blockchain Systems

Ingram 出版
2025/01/02 出版

Data Management and Security in Blockchain Systems offers a comprehensive exploration of how blockchain technology is reshaping the landscape of data management and security. This book addresses key aspects of blockchain-based systems, including data integrity, transparency, and tamper resistance, making it an essential resource for students, researchers, and professionals. Covering topics from blockchain-enabled IoT traffic management to the integration of AI for enhanced security, this book presents solutions to current challenges such as cyberattacks, smart grid security, and scalable network designs. Each chapter is thoughtfully structured to provide readers with a solid understanding of blockchain applications in diverse domains. Perfect for those seeking to understand blockchain's potential to secure and manage data in an increasingly interconnected world. Key Features: - Comprehensive overview of data management and security in blockchain networks.- Practical insights into IoT, smart grids, and AI integration.- In-depth analysis of cybersecurity challenges and solutions.

9 特價2284
立即代訂
下次再買

Don't Be the Weakest Link

Ingram 出版
2025/01/01 出版

This is the Bionic Reading(R) edition for readers with ADHD.Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape. Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link! Short Description on Ingram: Learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps.

9 特價1026
立即代訂
下次再買

Don't Be the Weakest Link

Ingram 出版
2025/01/01 出版

Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape. Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link!

9 特價684
立即代訂
下次再買

Artificial Intelligence and Financial Security

Ingram 出版
2024/12/31 出版

DESCRIPTION This book "Artificial Intelligence and Financial Security" explores the transformative power of AI in enhancing and safeguarding financial systems. This comprehensive guide looks into AI-driven solutions for fraud detection, risk management, regulatory compliance, and market forecasting.With detailed case studies, actionable insights, and expert analyses, the book equips the readers to tackle emerging challenges in financial security. It provides a deep dive into cutting-edge technologies like ML, blockchain, and AI-powered cybersecurity, while highlighting the critical importance of ethical considerations and compliance with financial regulations. Each chapter is thoughtfully structured to guide readers from foundational concepts to practical strategies and insights into future trends in AI-driven finance.By the end of this book, you will be well-positioned to understand how AI is shaping the future of financial security. You will possess the knowledge to make informed financial decisions and navigate the increasingly AI-driven financial landscape with confidence.WHAT YOU WILL LEARN● Understanding the role of AI in securing and optimizing financial systems.● Detect fraud and manage risks using AI-driven strategies.● Apply ML for predictive analytics and anomaly detection.● Integrate blockchain and AI for enhanced financial security.● Navigate ethical and regulatory challenges in AI implementation.● Forecast trends and prepare for AI-driven financial innovation.WHO THIS BOOK IS FORThis book is for financial professionals, AI practitioners, researchers, and policymakers seeking to understand and apply AI in financial security. A basic understanding of finance, technology, or AI concepts is helpful but not mandatory, as the book provides foundational explanations alongside advanced insights.

9 特價2083
立即代訂
下次再買

Distributed Computing and Intelligent Technology

Springer 出版
2024/12/31 出版

This volume LNCS constitutes the refereed proceedings of the 21st International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2025, in Bhubaneswar, in India, in January 2025. ICDCIT is organized into two tracks: Distributed Computing (DC) and Intelligent Technology (IT). The DC track solicits original research papers contributing to the foundations and applications of distributed computing. The DC track PC accepted 10 papers (7 regular papers and 3 short papers), and the IT track PC accepted 8 regular papers, The conference presents and discusses results and ideas on the foundations and applications of distributed computing and intelligent technology.

9 特價3392
立即代訂
下次再買

Information and communication techniques course 7th EB

Ingram 出版
2024/12/30 出版

This theoretical and practical work, which is easy to understand for pupils in the seventh year of basic education, will also serve as a compendium for teachers wishing to learn computer science, as it conforms to the national curriculum for primary, secondary and technical education in the Democratic Republic of Congo. In this book, we have focused on notions such as: mastering general computer concepts, presenting the computer, discovering computer peripherals, Windows fundamentals, directory files, search engine browsers, different websites, using e-mail, attachments and handling MS Word. If you follow this book through to the end, you'll be well on your way to the sixth year of the humanities, and the concepts covered in the fourth year will no longer be a problem. We look forward to receiving your comments, criticisms and suggestions for improving this book, and encourage every school to acquire a copy.

9 特價2937
立即代訂
下次再買

Introduction to 5G Technology

Ingram 出版
2024/12/28 出版

This textbook provides a comprehensive introduction to 5G technology, exploring both the underlying principles and its wide-ranging applications. The book is designed for students, researchers, and professionals seeking to understand the key concepts, architecture, and features of 5G networks. It delves into the evolution of mobile communication systems, from 1G to 4G, and presents a detailed overview of the advancements that make 5G distinct. The text covers essential topics such as the 5G network architecture, key enabling technologies (including millimetre waves, small cells, massive MIMO, and beam forming), and the role of network slicing and virtualization. It explores the impact of 5G on various industries, including telecommunications, healthcare, automotive, and smart cities, providing real-world examples of applications and use cases. With clear explanations, illustrative diagrams, and practical case studies, the book not only addresses the theoretical foundations but also emphasizes the practical implications and challenges in the deployment of 5G technology. It is an essential resource for anyone seeking to gain a solid understanding of 5G's potential.

9 特價2937
立即代訂
下次再買

Establish an Insider Threat Program under NISPOM

Ingram 出版
2024/12/28 出版

Establish an Insider Threat Program Under NISPOM focuses on protecting classified information. It also answers the question that so many people have asked, If we have the NISPOM, why do we need an insider threat program?If the NISPOM is so thorough, what would an additional insider threat program look like?Most organizations attack the problem with either an employee tracking or online activity reporting goal.After asking the above questions, we recommend a different solution. Of course the employee reporting and activity tracking solutions are important and part of the solution, but they should not be the end goal.This book recommends a different application that can easily be implemented to both resolve insider threat issues and demonstrate compliance.Establishing an Insider Threat Program Under NISPOM is written primarily for cleared defense contractors to meet Insider Threat Program requirements under the cognizance of the U.S. Government (Defense Counterintelligence and Security Agency (DCSA)).Our recommended approach and practices help reduce vulnerabilities without negatively impacting the work force. You will learn to be innovative in your approach as well as leverage industry best practices for a more effective ITP. These solutions incorporate a systems-based approach that meets the following criteria: Document what needs to be protectedEstablish countermeasures to limit accessMeet reporting requirements for unauthorized accessTrain the workforceThis book provides tools and templates that you can use immediately to document your progress and demonstrate program during reviews.This book includes: Insider Threat Program Templates, tools and productsSample training certificatesSpreadsheets for documenting risk

9 特價1140
立即代訂
下次再買

Angular Masterclass

Souvik,Basu  著
Ingram 出版
2024/12/27 出版

DESCRIPTION Angular is a popular JavaScript framework that empowers developers to create single-page applications (SPAs) with ease. This comprehensive guide is designed to equip you with the skills and knowledge to become a proficient Angular developer, even if you are starting from scratch.This book offers a step-by-step guide to mastering Angular development. It starts with setting up your environment, using Angular CLI for efficient project management, and creating reusable components that form the core of any Angular app. You will learn data binding to connect data with your user interface and routing to guide users through your app's sections. The book covers TypeScript basics, Angular's primary language, and component lifecycle hooks for managing behavior at different stages. Advanced topics include handling user input with reactive forms, testing for quality assurance, and deploying your application effectively. Additionally, it covers styling to create attractive designs and accessibility practices to ensure your applications are usable for everyone.By the end of this masterclass, you will be well-equipped to confidently build modern, interactive, and user-friendly web applications using the power of Angular.WHAT YOU WILL LEARN● Optimize Angular applications for performance and responsiveness.● Utilize advanced Angular features like lazy loading and preloading. ● Optimize applications using change detection strategies and performance profiling. ● Debug production issues effectively with monitoring, telemetry tools, and error-handling mechanisms.● Implement internationalization (i18n) for multilingual applications. ● Explore component lifecycle and its management.WHO THIS BOOK IS FORThis book is ideal for aspiring and intermediate web developers, front-end engineers, and anyone interested in building dynamic web applications. Prior experience to basic JavaScript is recommended, but no prior knowledge of Angular is required.

9 特價2193
立即代訂
下次再買

Principles and Applications of Blockchain Systems

Hui,Liu  著
Ingram 出版
2024/12/27 出版

Technical theory, key technologies, and practical applications for consortium blockchains, with a solution to the CAP trilemma problem Principles and Applications of Blockchain Systems provides a comprehensive introduction to consortium blockchains, including the physical, network, consensus, and contract layers, covering technical theory, key technologies, and practical applications. Beyond the technical side, this book visually showcases the application potential of consortium blockchains, with information on implementation cases in network management (Multi-Identifier System) and secure storage (Mimic Distributed Storage System). This book thoroughly addresses the CAP trilemma problem for consortium blockchains, a major barrier to scalability, by presenting a novel quantifiable impossibility triangle with a solution. Additionally, optimization techniques in consortium blockchains, such as P2P protocols for future networks and consensus algorithms, are discussed in detail. Written by two highly qualified academics with significant experience in the field, Principles and Applications of Blockchain Systems discusses sample topics such as: Peer-to-peer networks in consortium blockchains, covering P2P network architecture and node discovery, data synchronization, and gossip protocols Basic concepts of distributed consistency, including the SMR model in blockchain systems, assumptions for distributed networks, and the Byzantine general's problem Consensus mechanisms evolution process from voting-based, including PBFT, RPCA, SCP, and CoT; to proof-based including PoW, PoS, and PoX; finally optimized by fusion both voting-based and proof-based, including PoV, PPoV, HotStuff. Types of vulnerability for smart contracts, covering solidity code, EVM execution, and blockchain system layers Historical trend of upgrade from electronic consensus to quantum consensus. With highly comprehensive coverage of the subject, Principles and Applications of Blockchain Systems serves as an ideal textbook for blockchain students and researchers, and a valuable reference book for engineers and business leaders involved in developing real-world blockchain systems.

9 特價6426
立即代訂
下次再買

Frontiers in Cyber Security

Biwen,Chen  著
Springer 出版
2024/12/26 出版

This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024. The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions. The papers are organized in the following topical sections: Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation. Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.

9 特價5219
立即代訂
下次再買

Frontiers in Cyber Security

Biwen,Chen  著
Springer 出版
2024/12/26 出版

This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024. The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions. The papers are organized in the following topical sections: Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation. Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.

9 特價4175
立即代訂
下次再買

Machine Learning Interview Guide

Rehan,Guha  著
Ingram 出版
2024/12/26 出版

DESCRIPTION This book prepares you with the knowledge and skills to confidently excel in the exciting world of machine learning (ML) interviews and launch a successful career in this dynamic field.This book offers a collection of curated questions and answers to help readers understand key ML concepts, including data processing, classification, regression, clustering, dimensionality reduction, time series, and natural language processing (NLP). While not exhaustive, it focuses on critical topics and common questions often encountered in interviews. The chapters highlight essential concepts without a strict order of importance, reflecting the informal nature of ML interviews. Alongside theoretical knowledge, the book emphasizes the importance of coding and real-world application for a deeper understanding. Practical exercises, coding projects, and continuous learning are crucial to mastering ML concepts.By mastering the concepts and question-answer formats presented in this book, you will be well-prepared to tackle technical interview challenges and confidently showcase your ML expertise. This guide will help you achieve your career goals in the exciting field of ML.WHAT YOU WILL LEARN● Understand core data concepts for ML.● Master classification and regression algorithms.● Learn clustering and dimensionality reduction techniques.● Analyze and forecast time-dependent data with time series analysis.● Gain NLP proficiency and understand human language with techniques like tokenization, stemming, lemmatization, and advanced language models. WHO THIS BOOK IS FORThis book can be used by an interviewee, interviewer, ML professionals who want to learn the interview structure, and ML practitioners who want to refresh their memory and use this book as a reference guide. Managerial and non-technical people can use this book to learn ML in unique ways through a question-answer format.

9 特價2083
立即代訂
下次再買

A.I Teaches You Cybersecurity

Ingram 出版
2024/12/25 出版

The Ultimate Cybersecurity Checklist: How to Protect Your Family, Business, and Personal Data is your essential guide to mastering the ever-evolving world of cybersecurity. In this comprehensive, action-oriented book, you'll discover practical steps to safeguard your most valuable assets-from personal devices and sensitive data to critical business infrastructure and smart home networks.With real-world case studies, expert insights, and a detailed, gamified approach, this book empowers you to level up your cybersecurity skills and protect against the most sophisticated threats, including AI-driven cyberattacks and cyber-physical vulnerabilities. Whether you're a beginner or a seasoned professional, the engaging, hands-on strategies inside will help you recognize threats, respond to attacks, and fortify your digital defenses.Packed with actionable advice, you'll learn: How AI is reshaping cybersecurity, from enhancing defense mechanisms to enabling more dangerous attacks.Case studies like the Stuxnet worm and the Colonial Pipeline hack that changed the world and shaped today's cybersecurity landscape.Step-by-step checklists for individuals, families, and businesses to assess vulnerabilities, implement protective measures, and create a culture of security.How to use AI-driven gamification platforms to build essential skills and become a Cybersecurity Champion through engaging, interactive learning.This is not just a book-it's a mission to equip you with the tools to stay ahead of the curve. As the world becomes more interconnected and the threats grow more sophisticated, don't wait for the next attack-take control of your security today with The Ultimate Cybersecurity Checklist.A must-read for anyone looking to protect their digital world in a fast-moving and dangerous cyber landscape!

9 特價846
立即代訂
下次再買

Bluesky for Dummies

Eric,Butow  著
For Dummies 出版
2024/12/24 出版

The first and most trustworthy guide to the hot new social media platform Bluesky has been taking the social media world by storm. The platform offers users a high degree of control over what information they view and share, abilities they've lost on other platforms. Bluesky For Dummies serves as your guidebook to navigating the new platform. Learn to import your contacts, control your feed, and share content, with easy-to-follow instructions. This book also shows you how to manage who can contact you and access your content, so you can avoid bots, trolls, and other unsavory characters. For business owners, this Dummies guide is a breath of fresh air--learn how to set up Bluesky for your business and enjoy a peaceful and profitable social experience. Discover how Bluesky differs from the other social media apps out there Create a profile, make connections, share your content, and build a following Take control of your social media experience with access and content settings Connect with users by exploring custom lists and feeds Refugees from other social media sites, as well as social media beginners, can find out what it's like to be social without the downsides, thanks to Bluesky For Dummies.

9 特價684
立即代訂
下次再買
頁數18/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing