0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

C++ Networking 101, Second Edition

Gitforgits 出版
2025/10/06 出版

The point of this edition is to help C++ programmers get the skills and confidence they need to do a wide range of networking tasks. The book gives lots of practical, easy-to-follow examples and covers most key areas of network programming, but intentionally leaves out highly complex scenarios.It starts with the basics of how C++ works with TCP/IP and gradually builds on that as you learn to write client-server applications, configure IP addressing and subnets, implement protocols like HTTP, FTP, SMTP, IMAP, and DNS, and handle network communication errors effectively. It's packed with clear explanations and real code that works. You'll dive into VPN setups, wireless networking standards, asynchronous programming models, and network simulations, using modern C++23 features throughout. As the chapters go on, the focus moves on to getting the most out of devices and making them run smoothly. This includes using NETCONF to automate device configurations, managing firmware updates, tweaking socket behavior for better performance, setting up recovery systems, and making diagnostic tools. You'll also set up network monitoring using Nagios, along with custom C++ checks to track faults, performance metrics, and security events in real time. After finishing, you'll be able to think and work like a network programmer and administrator, and you'll be ready to use your skills in real-world situations.Key FeaturesBuild strong foundations in TCP/IP networking using modern C++ coding examples.Work on client-server applications with TCP and UDP sockets, and get to know real-world communication patterns.Get hands-on with IP addressing, subnets, and routing through practical demonstrations and progressive programming exercises.Put core application protocols like HTTP, FTP, SMTP, IMAP, and DNS in C++.Take advantage of NETCONF and C++ to automate configuration tasks across network devices efficiently and consistently.Employ asynchronous programming, multithreading, and event-driven models to handle high-performance networking scenarios.Program your devices to automatically update their firmware, adjust their settings, and recover if something goes wrong.Combine Nagios monitoring with custom C++ checks for fault, performance, and security visibility.Simulate and test networks using NS-3 and diagnostic tools for real-time problem solving.Table of ContentIntroduction to Networking and C++Understanding TCP and UDPNetwork Interfaces and AddressingApplication Layer ProtocolsVPNsWireless NetworksAsynchronous ProgrammingNetwork Testing and SimulationNetwork Configuration ManagementNetwork Monitoring

9 特價2394
立即代訂
下次再買

The Propagation of Misinformation in Social Media

2025/09/25 出版

There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner disproportionate engagement. Within this clamour, fringe sources and viewpoints are mainstreaming, and mainstream media are marginalized. This book takes up the mainstreaming of the fringe and the marginalization of the mainstream. In a cross-platform analysis of Google Web Search, Facebook, YouTube, Reddit, Twitter, Instagram, 4chan and TikTok, the authors found that hyperpartisan web operators, alternative influencers and ambivalent commentators are in ascendency. The book can be read as a form of platform criticism. It puts on display the current state of information online, noting how social media platforms have taken on the mantle of accidental authorities, privileging their own on-platform performers and at the same time adjudicating between claims of what is considered acceptable discourse.

9 特價7956
貨到通知
下次再買

Practical IoT Solutions for Students Using Popular Development Platforms

Eliva Press 出版
2025/09/23 出版

Practical IoT Solutions for Students Using Popular Development Platforms: Arduino, Raspberry Pi and NodeMCU is your gateway to understanding the dynamic and rapidly evolving world of IoT. Designed for students and enthusiasts, this book provides a hands-on approach to learning, exploring practical applications of IoT using popular platforms like Arduino Uno, Raspberry Pi, and NodeMCU. This book bridges the gap between theory and practice, empowering readers to create innovative solutions for real-world problems. With step-by-step explanations, detailed projects, and simplified concepts, it introduces the fundamentals of IoT, sensor integration, cloud connectivity, and automation.

9 特價2565
立即代訂
下次再買

AHS Internet Password Logbook

2025/09/23 出版

Remembering internet passwords and usernames has never been more beautiful! Easily store this precious information all in one place with this alphabetically tabbed logbook. This handy and essential record-keeping tool from the foremost authority in North American gardening, the American Horticultural Society, is accented by historical botanical illustrations and filled with hundreds of entry templates that make it easy to track important device logins, passwords, usernames, URLs, recovery keys, and wireless network details. Gone are the days of scribbling these essential details on sticky notes that get lost or thrown away! The cut-away alphabetical tabs make the recorded information easy to find, and quick tips for creating strong passwords and keeping your information safe on the internet are also found inside. Included are places to record: 400 different websites and their usernames and passwords (with room for three password changes each) Login information and recovery keys for 6 different devices, including phones, tablets, or computersFactory-default and user-defined usernames and passwords for wireless networks A blank lined page for jotting down additional notesA removable title band and the botanical-accented cover mean others won't know that important information is housed in this pretty little book, making it as discreet as it is convenient. A perfect gift for any flower lover or for yourself! **Also in this series of giftable books from the American Horticultural Society is the AHS Weekly Planner.

9 特價444
立即代訂
下次再買

They Lied About SEO

Vizzybrand 出版
2025/09/19 出版

They Lied About SEO is the no-fluff, real-world guide for small business owners, content creators, and entrepreneurs who are sick of being invisible online.You've probably been told that SEO is all about keywords, backlinks, and technical tricks. You've probably also been told that to get seen, you'll need to run ads, hire an agency, or learn how to "play the algorithm." But after spending time, money, and energy on things that don't work, you're still not showing up where it matters. That's not your fault.They lied to you.In this raw and revealing book, serial entrepreneur and marketing expert Eric F Gilbert exposes the truth behind the SEO industry-and why it's rigged to keep you confused and paying. He's helped hundreds of real people build real visibility without spending a fortune, writing code, or waiting months for results.This book breaks down how online visibility really works in today's AI-driven internet, and shows you how to become the authority people trust and the name they see everywhere-without needing to master tech or chase ever-changing search engine updates.You'll discover: Why traditional SEO advice fails most small business ownersHow to build digital visibility without ads, hacks, or complexityA proven strategy that leverages real conversations, expert positioning, and omnipresenceHow to dominate your niche by becoming the one people see, trust, and buy fromWhether you're just starting out or you've been spinning your wheels for years, They Lied About SEO will finally give you the clarity and strategy you need to get found-and get paid.Stop wasting time. Stop guessing. Stop feeding the machine. It's time to own your visibility.

9 特價615
立即代訂
下次再買

Security for Everyone

Laura,Bell  著
Holloway 出版
2025/09/19 出版

Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test your personal security assumptions and practices, which will set you up to lead security for an ever-growing team. You'll learn frameworks for understanding security at different stages of your business, and be guided on a practical journey from secure individual to security leader.Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.You'll learn: Why security matters and how it applies to our business, systems, data, and people.How to protect your own data and key accounts online (such as email and social media)-not just for your own benefit but for the safety of those you care about.How to protect your small business and the key data and tools you rely on to operate-from your website to your email-whether you are protecting yourself or working with a service provider.How to protect your startup and maximize your chance of survival as you take big risks and innovate-from vulnerability management as the technical environment team grows, to communicating security with your customers.How to scale your security for your growing organization-moving your security approach from foundations, to weaving security through your day to day operations and assessing the threats you face as your strategy changes.

9 特價1197
立即代訂
下次再買

Security for Everyone

Laura,Bell  著
Holloway 出版
2025/09/19 出版

Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test your personal security assumptions and practices, which will set you up to lead security for an ever-growing team. You'll learn frameworks for understanding security at different stages of your business, and be guided on a practical journey from secure individual to security leader.Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.You'll learn: Why security matters and how it applies to our business, systems, data, and people.How to protect your own data and key accounts online (such as email and social media)-not just for your own benefit but for the safety of those you care about.How to protect your small business and the key data and tools you rely on to operate-from your website to your email-whether you are protecting yourself or working with a service provider.How to protect your startup and maximize your chance of survival as you take big risks and innovate-from vulnerability management as the technical environment team grows, to communicating security with your customers.How to scale your security for your growing organization-moving your security approach from foundations, to weaving security through your day to day operations and assessing the threats you face as your strategy changes.

9 特價1436
立即代訂
下次再買

Future-Ready with Generative AI

CRC Press 出版
2025/09/16 出版

For the first time in history, the most powerful artificial intelligence (AI) works through language itself: The same medium humans use to think and communicate. Dr Michael Kollo reveals why this makes AI uniquely accessible to everyone, and how to harness this linguistic revolution for work and life.This book thoughtfully explores why language-based AI represents something fundamentally different from previous automation, examining both imagined fears and genuine possibilities for workforce transformation. It explains why institutional change takes time despite impressive capabilities, how AI systems are quietly becoming our digital confidants, and why we may eventually come to resent the very technologies we initially embrace. These concepts are explained with care through real-world examples and practical frameworks, whilst companion fictional stories help different audiences understand the emotional reality of technological change. From a software developer orchestrating AI agents to a postal worker finding unexpected digital companionship, these narratives illuminate what it actually feels like to live through this transformation. The book addresses both the remarkable potential of conversational AI and its capacity for subtle manipulation, providing readers with the understanding needed to engage thoughtfully with systems that speak our language.Future-Ready with Generative AI: Skills, Mindsets and Stories in the Age of AI transforms AI from intimidating complexity into intuitive collaboration. Because these systems work through language, everyone can learn to use them effectively. Readers wil gain practical wisdom for leveraging conversational AI while preserving human creativity, relationships, and independent thinking.

9 特價2046
立即代訂
下次再買

Cybersecurity For Beginners

Ayhma,Awther  著
2025/09/14 出版

Gain mastery over Cybersecurity Essentials without being overwhelmed by technical jargon or prior tech experience!Are you curious about the rapidly evolving world of cybersecurity but find yourself lost in a sea of acronyms and technical vocabulary? Do you want to protect your personal information online but fear making mistakes that could compromise your security? Are you looking to break into a cybersecurity career but unsure where to begin? If you've found yourself nodding along, you're not alone. Many individuals, eager to explore technology and protect themselves in a digital world, grapple with similar concerns. However, there's no need to feel daunted. Discover how "Cybersecurity For Beginners" can empower you to navigate this exciting field with confidence and ease. Here's just a taste of what you can unveil inside this enlightening guide: The beginner-friendly guide to cybersecurity, designed specifically for those with minimal technical background.Five fundamental principles of cybersecurity you need to know to safeguard your digital life.A complete mapping of common cyber threats like phishing, malware, and ransomware-and how to shield yourself against them.How to fortify your passwords without creating cumbersome combinations you'll forget.Explore various career paths in cybersecurity with insights from diverse roles like SOC analyst and penetration tester.Step-by-step instructions on setting up a VPN and using two-factor authentication for enhanced protection.Learn the practical application of cybersecurity measures through real-world case studies.Eight game-changing security habits that elevate your personal safety in the digital realm.The importance of the CIA triad and its role as the cornerstone of all cybersecurity practices.How current trends and technologies impact cybersecurity and what you must watch out for.Tips for avoiding common cybersecurity pitfalls to protect your home network without worry....and much more! Think you need to be a tech expert to understand this book? Think again! This guide is crafted with clarity and real-world practicality at its core, using accessible language with visual aids to make complex ideas relatable and easy to grasp. In this rapidly evolving digital age, keeping up with cybersecurity shouldn't be a daunting task but an empowering journey. Whether you're starting from scratch or looking to refine your skills, this book provides a comprehensive, up-to-date resource tailored for beginners. Embrace this opportunity to get ahead in cybersecurity and safeguard your digital future with confidence. Scroll up and click "Add to Cart" to begin your journey now! See you on the inside.

9 特價751
立即代訂
下次再買

AI and ADA

2025/09/10 出版

Preface The book's Preface places the current AI explosion in the context of other technological cataclysms and recounts the author's personal (and not always deadly serious) AI journey. Chapter One: "Extracting the Essence: Toward Machine Translation of Literature" This 2019 essay rashly inquired whether artificial intelligence (AI) and machine translation (MT) might eventually be applied to literary translation. Such translation strives to somehow preserve the essence of a work while carrying it over to a different language and culture and giving it rebirth there. To recognize that essence, the translator must accurately capture the meaning of the original; appreciate its metaphors, connotations, register, references, and other abstract or associative factors; and choose among available target language expressions by exercising esthetic judgments. Computers, however, have until recently remained incapable of such accuracy, abstraction, and judgment. We revisited these shortfalls in light of developments in MT and AI. We teased apart several separable aspects of literary translation - literal meaning, meter, rhyme, and the abovementioned associative elements - with reference to arguments about Vladimir Nabokov's hyper-literal translation of Pushkin's poem Eugene Onegin. Prompted by this debate, we came to analyze translation as an optimization problem: because it will often prove impossible to perfectly convey all aspects or essences of a text in a single translation, the translator must search for some optimal compromise. Then we discussed several avenues for improvement in MT which could help to extract these aspects of a text's essence - first, those which might enhance textually grounded MT (i.e., MT trained on text only), leading to delivery of high-quality literal translations; and second, those related to perceptually grounded MT (i.e., MT trained on simulated perception, e.g. of audiovisual input, as well as text), which might extract more abstract or associative elements of a text. We suggested that recognition of categories would prove central to the essence extraction sought by translators. As this categorization improves, MT should increasingly support literary, and thus cultural, preservation. However, the deepest artificial esthetic judgments will await artificial emotion. Chapter One concluded with two appendices, the first sampling numerous competing translations of Pushkin verses and the second displaying widely varying translations of a short French poem. Chapter Two: "Toward an Artificial Nabokov" Chapter One inquired whether artificial translation of literature might be at all possible. The cautious conclusion was that while high-quality literal translation might be achievable through foreseeable development of current techniques, artistic translation would await artificial emotion, a more distant prospect. This 2021 sequel went on to ask whether an artificial intelligence might eventually gain the ability to actually create works of literary art. To throw literary consciousness into the sharpest relief, we took as exemplar an author known for a kind of hyper-consciousness: Vladimir Nabokov. To be sure, the suggestion that artworks combining Nabokov's superhuman intricacy and wholly human depth could be authored by a collection of switches would horrify this transcendent author, and does seem to fly in the face of everything that is most human. But while we are concerned with what machines might do, our more fundamental concern is to understand the human thoughts and feelings to which machines might aspire; and this understanding, promising to bridge the gap between C.P. Snow's two cultures, is finally coming within reach. In our literary context, Nabokov scholarship provides many specific examples - in Ada: or Ardor, Pale Fire, and other works - of the author's hyper-conscious artistic techniques: glorying in memory; repetition to establish themes and motifs; allusion to wide-ranging w

9 特價853
立即代訂
下次再買

AI and ADA

2025/09/10 出版

Preface The book's Preface places the current AI explosion in the context of other technological cataclysms and recounts the author's personal (and not always deadly serious) AI journey. Chapter One: "Extracting the Essence: Toward Machine Translation of Literature" This 2019 essay rashly inquired whether artificial intelligence (AI) and machine translation (MT) might eventually be applied to literary translation. Such translation strives to somehow preserve the essence of a work while carrying it over to a different language and culture and giving it rebirth there. To recognize that essence, the translator must accurately capture the meaning of the original; appreciate its metaphors, connotations, register, references, and other abstract or associative factors; and choose among available target language expressions by exercising esthetic judgments. Computers, however, have until recently remained incapable of such accuracy, abstraction, and judgment. We revisited these shortfalls in light of developments in MT and AI. We teased apart several separable aspects of literary translation - literal meaning, meter, rhyme, and the abovementioned associative elements - with reference to arguments about Vladimir Nabokov's hyper-literal translation of Pushkin's poem Eugene Onegin. Prompted by this debate, we came to analyze translation as an optimization problem: because it will often prove impossible to perfectly convey all aspects or essences of a text in a single translation, the translator must search for some optimal compromise. Then we discussed several avenues for improvement in MT which could help to extract these aspects of a text's essence - first, those which might enhance textually grounded MT (i.e., MT trained on text only), leading to delivery of high-quality literal translations; and second, those related to perceptually grounded MT (i.e., MT trained on simulated perception, e.g. of audiovisual input, as well as text), which might extract more abstract or associative elements of a text. We suggested that recognition of categories would prove central to the essence extraction sought by translators. As this categorization improves, MT should increasingly support literary, and thus cultural, preservation. However, the deepest artificial esthetic judgments will await artificial emotion. Chapter One concluded with two appendices, the first sampling numerous competing translations of Pushkin verses and the second displaying widely varying translations of a short French poem. Chapter Two: "Toward an Artificial Nabokov" Chapter One inquired whether artificial translation of literature might be at all possible. The cautious conclusion was that while high-quality literal translation might be achievable through foreseeable development of current techniques, artistic translation would await artificial emotion, a more distant prospect. This 2021 sequel went on to ask whether an artificial intelligence might eventually gain the ability to actually create works of literary art. To throw literary consciousness into the sharpest relief, we took as exemplar an author known for a kind of hyper-consciousness: Vladimir Nabokov. To be sure, the suggestion that artworks combining Nabokov's superhuman intricacy and wholly human depth could be authored by a collection of switches would horrify this transcendent author, and does seem to fly in the face of everything that is most human. But while we are concerned with what machines might do, our more fundamental concern is to understand the human thoughts and feelings to which machines might aspire; and this understanding, promising to bridge the gap between C.P. Snow's two cultures, is finally coming within reach. In our literary context, Nabokov scholarship provides many specific examples - in Ada: or Ardor, Pale Fire, and other works - of the author's hyper-conscious artistic techniques: glorying in memory; repetition to establish themes and motifs; allusion to wide-ranging w

9 特價3762
立即代訂
下次再買

The $10 Million Instagram Funnel

Brian,Mark  著
2025/09/08 出版

In $10 Million Instagram Funnel, Brian Mark shares the proven strategies he used to grow a thriving online fitness business without paid ads, complicated funnels, or a website. This book is a step-by-step guide for fitness professionals looking to attract high-paying clients, generate consistent leads, and scale using organic social media. Brian breaks down how to build a standout personal brand, create content that converts, and implement a simple system for lead generation and sales. Whether you're just starting or ready to grow, this book gives you the blueprint to build a six-figure fitness business with ease.

9 特價1026
立即代訂
下次再買

The $10 Million Instagram Funnel

Brian,Mark  著
2025/09/08 出版

Brian Mark shares the proven strategies used to grow a thriving online coaching company without paid ads, complicated funnels, or a website. This book is a step-by-step guide for business owners looking to attract high-paying clients, generate consistent leads, and scale using organic social media. Brian breaks down how to build a standout personal brand, create content that converts, and implement a simple system for lead generation and sales. Whether you're just starting out or ready to grow, this book gives you the blueprint to build a six-figure business with ease.

9 特價684
立即代訂
下次再買

Cybersecurity Mistakes for SMBs to avoid

Acrasolution 出版
2025/09/08 出版

Cybersecurity Mistakes to Avoid: How to Protect Your Small Business from Costly ThreatsMost businesses aren't hacked by elite cybercriminals working in secret government labs. They're breached by avoidable mistakes-a missed update, a weak password, a careless click on a phishing link. And while the headlines focus on billion-dollar companies, small and mid-sized businesses (SMBs) are the real targets.In Cybersecurity Mistakes to Avoid, Eric LeBouthillier exposes the 15 most dangerous security errors threatening SMBs today-and shows you exactly how to fix them before they cost you everything.This isn't theory. It's battle-tested insight from real-world incidents-written in plain English, stripped of jargon, and designed for business owners, startup founders, IT leads, and anyone responsible for protecting digital assets on a budget.✅ Inside you'll discover: Why "too small to be a target" is a deadly myth-and why SMBs are prime targets for ransomware, phishing, and credential stuffing.The password problem most teams ignore-and how to fix it with password managers, unique logins, and multi-factor authentication.Phishing traps that still work in 2025-how modern attackers trick even savvy employees, and how to train your team to spot the bait.The risks of remote work and BYOD-and the practical steps to secure home offices, VPNs, and personal devices without killing productivity.The hidden cost of skipping updates and patches-and how automated patching can close doors attackers exploit daily.Cloud and AI security blind spots-why your provider doesn't secure everything, and how careless AI usage can leak sensitive data.Backup and recovery mistakes-why untested backups fail when you need them most, and the 3-2-1 rule every SMB must know.Compliance and incident response-how to get ahead of SOC 2, GDPR, HIPAA, and why having a tested response plan can save your company.✅ Real-World Case StudiesEvery chapter includes real-world breaches from small firms-architecture firms paying $28,000 in ransom, marketing agencies losing $40,000 to reused passwords, startups exposing customer data in cloud misconfigurations, and more. You'll see what went wrong, what it cost, and how it could have been avoided with simple, affordable measures.✅ Who This Book Is ForSmall business owners & solopreneurs who need practical protection without hiring a full-time security team.Startup founders & consultants managing sensitive client data and customer trust.IT managers & developers trying to secure systems while staying lean.

9 特價648
立即代訂
下次再買

The Podcast Pantheon

Sean,Malin  著
Chronicle Books 出版
2025/09/03 出版

Spanning the most popular podcast genres--true crime, comedy, sports, relationships, and more--culture critic and Vulture's Start Here columnist Sean Malin introduces the first comprehensive canon in podcast history. Featuring a foreword by award-winning actor and producer Jon Hamm. The Golden Age of podcasts is upon us. With over fifty official podcast networks, more than three million programs of every imaginable category available for download, and tens of millions of unique listens and views every week in the US alone--plus, our favorites being adapted into dozens of beloved films, TV series, and books--podcasts are now part of the fabric that makes up our everyday global media. Finally, here is an exclusive insider's perspective told through 101 different shows across dozens of genres. The Podcast Pantheon is the first book of its kind: A resource for discovering podcasts and learning more about how this multibillion-dollar industry came into being from the geniuses who created it. Delving into genres of all kinds--including fashion, food, health, sex, tech, and more--Malin profiles all the top podcasts, from Serial to Comedy Bang! Bang!, guiding fans to: Find out more about their favorite shows and how they got started. Learn about each podcast's influences and impact on culture, history, future shows, and the industry at large. Hear exclusive stories and enjoy never-before-seen behind-the-scenes photos from favorite hosts. Discover hidden gems, whether an entirely new podcast, a new-to-you genre, or something reminiscent of an old favorite. Readers will find podcasts worth listening to and get expert advice on the best episodes to start with, solving one of the biggest and most intimidating hurdles when trying to dive into a longstanding show. Malin's easy-to-read profiling and titillating exploration of 101 podcasts offers something for everybody, whether you've been listening to podcasts for years, are new to them, or are looking to start your own. EXPERT KNOWLEDGE: A culture critic since 2007 and the writer behind Vulture's hit podcasting column Start Here, Sean Malin has interviewed and connected with the world's top podcasters, including Marc Maron, Conan O'Brien, Nicole Byer, Ira Glass, and Jenna Fischer and Angela Kinsey, among many others, and has the inside scoop on the most popular and award-winning podcasts. A MUST-HAVE LISTENER'S COMPANION: Dip in and out of this enticing guide that's perfect for beginners and serious listeners alike. Profiled podcasts include: WTF with Marc Maron My Favorite Murder Conan O'Brien Needs a Friend Office Ladies Why Won't You Date Me? The Accessible Stall Stuff You Should Know Wait, Wait . . . Don't Tell Me! How Did This Get Made? Fresh Air The Moth S-Town Hollywood Handbook Doughboys Bad with Money Welcome to Night Vale And many more! FAN FAVORITES AND NEW DISCOVERIES: Sean Malin reveals fascinating information about 100+ shows and their talented hosts, tells you where to listen, and offers his favorite episode pick for each. His wide-ranging and comprehensive overview gives ample opportunity to discover something new to dive right into. Perfect for: Podcast enthusiasts and new listeners Those in search of new podcasts to devour Podcast creators and anyone interested in starting their own podcast Foodies, artists, entrepreneurs, fashionistas, parents, teachers, fitness enthusiasts, newshounds, and many more Gift-giving to podcast junkies and pop culture fans Media professionals, scholars, educators, historians, and consumers

9 特價853
立即代訂
下次再買

Computer Safety, Reliability, and Security. Safecomp 2025 Workshops

Springer 出版
2025/08/23 出版

This book constitutes the proceedings of the Workshops held in conjunction with the 44th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2025, which took place in Stockholm, Sweden, during September 2025. The 43 papers included in this book were carefully reviewed and selected from a total of 61 submissions to the following six workshops: - CoC3CPS 2025, Co-Design of Communication, Computing and Control in Cyber-Physical Systems - DECSoS 2025 - 20th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems - SASSUR 2025 - 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems - SENSEI 2025 - 4th International Workshop on Safety and Security Interaction - SRToITS 2025 - 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems - WAISE 2025 - 8th International Workshop on Artificial Intelligence Safety Engineering

9 特價4175
立即代訂
下次再買

Computer Safety, Reliability, and Security

Springer 出版
2025/08/23 出版

This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025. The 15 full papers included in these proceedings were carefully reviewed and selected from 79 submissions. They were organized in topical sections as follows: Safety Arguments/Cases; Data Sets and Dependability Properties; Testing and Complex Environments; Methodologies (1) - Safety Design and Risk Assessment; and Methodologies (2) Machine Learning and Large Language.

9 特價3914
立即代訂
下次再買

The Social Media Trap - How to Protect Your Mental Health in a Digital World

Emma,Parker  著
2025/08/21 出版

Social media was designed to connect us-but for many, it's doing the opposite. Anxiety, comparison, loneliness, and burnout are becoming the hidden costs of a life lived online.The Social Media Trap - How to Protect Your Mental Health in a Digital World is a wake-up call and a guidebook for anyone feeling overwhelmed by the endless scroll. Backed by psychology, neuroscience, and real-world stories, this book reveals how digital platforms are engineered to hijack your attention, exploit your emotions, and subtly shape your self-worth-and more importantly, how to break free.This isn't about quitting the internet. It's about reclaiming your time, focus, and emotional well-being in a hyperconnected world.Inside, you'll learn: How social media affects the brain-especially dopamine, attention, and moodThe links between screen time, anxiety, depression, and self-esteemThe role of algorithms in creating addiction, polarization, and FOMOPractical strategies to set digital boundaries and reduce online stressHow to curate a healthier online environment without disconnecting completelyTools for developing digital resilience, self-awareness, and mindful tech habitsWhether you're a parent, teen, professional, or everyday user, The Social Media Trap offers clarity in a confusing landscape. It empowers you to take control of your digital experience-and protect your mental health without giving up the benefits of modern connection.Because your mind is too valuable to be managed by an algorithm.

9 特價239
立即代訂
下次再買

Dark Web Reality

2025/08/20 出版

Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret marketplaces to encrypted communication hubs, the dark web has captured public imagination as a place of danger, secrecy, and forbidden activity. But the truth is far more complex. In Dark Web Reality, you'll journey through the internet's hidden layers-uncovering the facts, the myths, and the double-edged nature of anonymity in the digital age.Inside, you'll discover: The three layers of the internet - surface, deep, and dark web - and how they interact.The rise of Tor and onion routing, and why anonymity can be both a shield for freedom and a cloak for crime.Digital black markets, from the infamous Silk Road to modern underground economies.The light within the darkness - whistleblowing platforms, human rights tools, and lifesaving uses of hidden networks.Law enforcement in the shadows, battling cybercrime while protecting online freedoms.How to stay safe online, avoid scams, and understand the ethical boundaries of hidden internet use.Written with investigative depth and clear explanations, Dark Web Reality pulls back the digital curtain to reveal what truly happens beyond the reach of Google. Whether you're a cybersecurity enthusiast, a concerned citizen, or simply curious about what lies beneath the surface, this book will equip you with the knowledge to navigate - and understand - the hidden world of the internet.Enter at your own risk - and with open eyes.

9 特價513
立即代訂
下次再買

Dark Web Reality

2025/08/20 出版

Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret marketplaces to encrypted communication hubs, the dark web has captured public imagination as a place of danger, secrecy, and forbidden activity. But the truth is far more complex. In Dark Web Reality, you'll journey through the internet's hidden layers-uncovering the facts, the myths, and the double-edged nature of anonymity in the digital age.Inside, you'll discover: The three layers of the internet - surface, deep, and dark web - and how they interact.The rise of Tor and onion routing, and why anonymity can be both a shield for freedom and a cloak for crime.Digital black markets, from the infamous Silk Road to modern underground economies.The light within the darkness - whistleblowing platforms, human rights tools, and lifesaving uses of hidden networks.Law enforcement in the shadows, battling cybercrime while protecting online freedoms.How to stay safe online, avoid scams, and understand the ethical boundaries of hidden internet use.Written with investigative depth and clear explanations, Dark Web Reality pulls back the digital curtain to reveal what truly happens beyond the reach of Google. Whether you're a cybersecurity enthusiast, a concerned citizen, or simply curious about what lies beneath the surface, this book will equip you with the knowledge to navigate - and understand - the hidden world of the internet.Enter at your own risk - and with open eyes.

9 特價917
立即代訂
下次再買

Advanced Technologies in Electronics, Communications and Signal Processing

Springer 出版
2025/08/20 出版

This book LNICST 620 constitutes the proceedings of the First EAI International Conference on Advanced Technologies in Electronics, Communications and Signal Processing, ICATECS 2024, held in Hyderabad, India, during July 26-27, 2024. The 65 full papers were carefully reviewed and selected from 210 submissions. They were categorized under the topical sections as follows: Wireless Communication and IoT; RF and Signal processing; VLSI System Design; Machine Learning and Deep Learning Applications.

9 特價5219
立即代訂
下次再買

Advanced Technologies in Electronics, Communications and Signal Processing

Springer 出版
2025/08/20 出版

This book LNICST 619 constitutes the proceedings of the First EAI International Conference on Advanced Technologies in Electronics, Communications and Signal Processing, ICATECS 2024, held in Hyderabad, India, during July 26-27, 2024. The 65 full papers were carefully reviewed and selected from 210 submissions. They were categorized under the topical sections as follows: Wireless Communication and IoT; RF and Signal processing; VLSI System Design; Machine Learning and Deep Learning Applications.

9 特價5219
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/19 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Understanding Artificial Intelligence

2025/08/19 出版

"Understanding Artificial Intelligence: Fundamentals and Applications" is an essential resource designed for students, educators, and practitioners seeking a solid foundation in the field of Artificial Intelligence (AI). This book aims to demystify core AI concepts such as machine learning, neural networks, data processing, and intelligent decision-making. It introduces fundamental theories alongside real-world examples to help readers grasp the evolving landscape of AI technologies. The book not only provides theoretical knowledge but also emphasizes practical implementations of AI across various domains including healthcare, robotics, education, and industry. With contributions from experienced academicians and researchers, it serves as a bridge between academic study and practical application-making it an ideal companion for learners and professionals who wish to understand and utilize the power of AI in solving real-life problems.

9 特價2565
立即代訂
下次再買

Learning Ransomware Response & Recovery

O'Reilly Media 出版
2025/08/19 出版

Ransomware attacks are no longer a question of if--they're a matter of when. With hackers increasingly targeting backup and disaster recovery (DR) systems, organizations need more than prevention strategies; they need a battle-tested plan for minimizing damage, forensically determining what's happened, and restoring their environment without paying the ransom. Renowned experts W. Curtis Preston and Dr. Mike Saylor offer a comprehensive guide to protecting critical systems and responding effectively when the worst happens. Whether you're a security professional who's unaware of how exposed your backup systems are or a backup admin in need of stronger security expertise, this book is your essential road map. With actionable advice, clear frameworks, and step-by-step guidance, it bridges the gap between data protection and cybersecurity--empowering teams to deliver decisive, effective responses when faced with ransomware. Prevent 90% of ransomware attacks with practical, simple steps Shield your backup systems from also being a victim of the attack Minimize the blast radius of attacks on your infrastructure Identify, isolate, and restore compromised systems with confidence Develop and test a detailed incident response plan

9 特價2052
立即代訂
下次再買

Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide

O'Reilly Media 出版
2025/08/19 出版

As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certification has never been more crucial. The Certificate of Cloud Security Knowledge (CCSK) exam, globally recognized and highly respected, presents a formidable challenge for many. Author Graham Thompson offers you in-depth guidance and practical tools not only to pass the exam but also to grasp the broader implications of cloud security. This book is filled with real-world examples, targeted practice questions, and the latest on zero trust and AI security--all designed to mirror the actual exam. By reading this book, you will: Understand critical topics such as cloud architecture, governance, compliance, and risk management Prepare for the exam with chapter tips, concise reviews, and practice questions to enhance retention See the latest on securing different workloads (containers, PaaS, FaaS) and on incident response in the cloud Equip yourself with the knowledge necessary for significant career advancement in cloud security

9 特價2052
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/18 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/18 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/18 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/18 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Guardians of the Digital Age

CRC Press 出版
2025/08/18 出版

A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time-digital security.

9 特價8874
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/18 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2025

Springer 出版
2025/08/18 出版

The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.

9 特價4175
立即代訂
下次再買

Understanding the Human Factor in Cyber Security

2025/08/17 出版

In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in Cyber Security: A Comprehensive Investigation delves deep into the most overlooked vulnerability in any system: human behavior. Drawing on real-world case studies like the Target, Equifax, and WannaCry breaches, Christopher Stephenson exposes the psychological, behavioral, and organizational pitfalls that hackers exploit with ease. This book is not just about the breaches, but about why they happen, how cognitive biases, stress, lack of awareness, and misplaced trust open the door to cyber threats. With a powerful blend of psychological insight, policy analysis, and practical strategies, Christopher presents a roadmap for individuals, professionals, and organizations to recognize and close the human gaps in their digital defense. Whether you're a cybersecurity specialist, a business leader, or simply someone navigating the digital world, this book will change how you think about security. Because in the end, the strongest system is only as secure as the people who use it. Fun Fact: When Christopher isn't decoding human behavior in cyberspace, he's clocking miles on his treadmill while reading the latest cybersecurity breach reports, fitness, and firewalls, all in a day's work!

9 特價919
立即代訂
下次再買

The Cyber Shield

Siddhi,Singh  著
FriesenPress 出版
2025/08/15 出版

Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the door to a new threat, how can individuals and organizations protect themselves? This comprehensive guide to cybersecurity illuminates key concepts such as threat modelling, risk assessment, and the CIA triad (Confidentiality, Integrity, and Availability). With relatable scenarios and actionable best practices, it demystifies the various types of cyber threats, ranging from malware and phishing for login credentials to propaganda on social media fronts and ransomware. Including effective responses to successful attacks, case studies show the real-world impact of cybercrime and equip everyone from laypeople to experts with the digital literacy necessary to reclaim control in a perilous landscape.

9 特價957
立即代訂
下次再買

The Cyber Shield

Siddhi,Singh  著
FriesenPress 出版
2025/08/15 出版

Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the door to a new threat, how can individuals and organizations protect themselves? This comprehensive guide to cybersecurity illuminates key concepts such as threat modelling, risk assessment, and the CIA triad (Confidentiality, Integrity, and Availability). With relatable scenarios and actionable best practices, it demystifies the various types of cyber threats, ranging from malware and phishing for login credentials to propaganda on social media fronts and ransomware. Including effective responses to successful attacks, case studies show the real-world impact of cybercrime and equip everyone from laypeople to experts with the digital literacy necessary to reclaim control in a perilous landscape.

9 特價1573
立即代訂
下次再買

Guardians of the Digital Age

CRC Press 出版
2025/08/15 出版

A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time-digital security.

9 特價1826
立即代訂
下次再買

Intelligent Approaches to Cyber Security

CRC Press 出版
2025/08/15 出版

Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. Features: Role of Deep Learning and Machine Learning in the Field of Cyber Security Using ML to defend against cyber-attacks Using DL to defend against cyber-attacks Using blockchain to defend against cyber-attacks This reference text will be useful for students and researchers interested and working in future cyber security issues in the light of emerging technology in the cyber world.

9 特價3496
立即代訂
下次再買

Traditional vs Generative AI Pentesting

CRC Press 出版
2025/08/15 出版

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.

9 特價3339
立即代訂
下次再買

Wireshark Essentials

Arun,Soni  著
CRC Press 出版
2025/08/15 出版

Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysis for network security and troubleshooting.

9 特價3339
立即代訂
下次再買

Machine Learning and Deep Learning in Natural Language Processing

CRC Press 出版
2025/08/15 出版

Natural Language Processing (NLP) is a sub-field of Artificial Intelligence, linguistics, and computer science and is concerned with the generation, recognition, and understanding of human languages, both written and spoken. NLP systems examine the grammatical structure of sentences as well as the specific meanings of words, and then they utilize algorithms to extract meaning and produce results. Machine Learning and Deep Learning in Natural Language Processing aims at providing a review of current Neural Network techniques in the NLP field, in particular about Conversational Agents (chatbots), Text-to-Speech, management of non-literal content - like emotions, but also satirical expressions - and applications in the healthcare field.NLP has the potential to be a disruptive technology in various healthcare fields, but so far little attention has been devoted to that goal. This book aims at providing some examples of NLP techniques that can, for example, restore speech, detect Parkinson's disease, or help psychotherapists.This book is intended for a wide audience. Beginners will find useful chapters providing a general introduction to NLP techniques, while experienced professionals will appreciate the chapters about advanced management of emotion, empathy, and non-literal content.

9 特價3496
立即代訂
下次再買

Traditional vs Generative AI Pentesting

CRC Press 出版
2025/08/14 出版

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.

9 特價8352
立即代訂
下次再買

Data Engineering for Cybersecurity

No Starch Press 出版
2025/08/14 出版

Turn raw logs into real intelligence. Security teams rely on telemetry--the continuous stream of logs, events, metrics, and signals that reveal what's happening across systems, endpoints, and cloud services. But that data doesn't organize itself. It has to be collected, normalized, enriched, and secured before it becomes useful. That's where data engineering comes in. In this hands-on guide, cybersecurity engineer James Bonifield teaches you how to design and build scalable, secure data pipelines using free, open source tools such as Filebeat, Logstash, Redis, Kafka, and Elasticsearch and more. You'll learn how to collect telemetry from Windows including Sysmon and PowerShell events, Linux files and syslog, and streaming data from network and security appliances. You'll then transform it into structured formats, secure it in transit, and automate your deployments using Ansible. You'll also learn how to: Encrypt and secure data in transit using TLS and SSHCentrally manage code and configuration files using GitTransform messy logs into structured eventsEnrich data with threat intelligence using Redis and MemcachedStream and centralize data at scale with KafkaAutomate with Ansible for repeatable deploymentsWhether you're building a pipeline on a tight budget or deploying an enterprise-scale system, this book shows you how to centralize your security data, support real-time detection, and lay the groundwork for incident response and long-term forensics.

9 特價1710
立即代訂
下次再買

Modern REST API Development in Go

Packt 出版
2025/08/13 出版

Master REST API design in Go in a pragmatic way by building production-ready web services using the Go standard library and idiomatic patternsKey Features: - Build scalable APIs using Go's robust standard library and HTTP tooling- Explore security, observability, and testing from a backend engineering perspective- Learn foundational REST principles by building a complete Go-based projectBook Description: Modern REST API Development in Go is a hands-on guide to understanding and applying REST principles using Go's powerful standard library. In an era where interconnected systems demand robust and performant APIs, Go offers the perfect combination of simplicity, performance, and tooling to build modern backend services.This book is centered around a complete, real-world REST API project and guides you through every stage of the development process, from building HTTP handlers to applying authentication and generating OpenAPI documentation. You'll learn to structure your application, handle persistence with common libraries like GORM and Squirrel, apply observability patterns through logging and tracing, and ensure code quality through unit and integration tests. Each concept is grounded in REST theory and backed by idiomatic Go practices, enabling you to build APIs that are not only functional but production-ready. By the end of the book, you'll be ready to design, build, and maintain REST APIs in Go.What You Will Learn: - Understand and implement HTTP handlers in Go- Create and manage RESTful routes- Persist and model data using GORM and Squirrel- Secure APIs with JWTs and basic authentication- Validate incoming requests with custom logic- Log and trace API activity for observability- Write unit and integration tests for endpoints- Generate API documentation using OpenAPIWho this book is for: This book is for developers who want to begin building REST APIs using the Go language. Whether you're new to Go or experienced in backend development, you'll gain practical skills and foundational knowledge to build secure, performant, and maintainable APIs. Ideal for backend engineers, system integrators, and full-stack developers entering the Go ecosystem.Table of Contents- Introduction to APIs- Exploring REST APIs- Building a REST Client- Designing Your REST API- Authentication and Authorization- Data Persistency- API Security- API Performance- Deploying Your API- Testing- Documenting with OpenAPI- Metrics, Logs, and Traces- Using GORM- Using the Echo Framework

9 特價2064
立即代訂
下次再買

Big Data and Social Computing

Springer 出版
2025/08/13 出版

This book constitutes the refereed proceedings of the 10th China National Conference on Big Data and Social Computing, BDSC 2025, held in Kunming, China, during August 15-17, 2025. The 40 full papers included in this book were carefully reviewed and selected from 140 submissions. They were organized in topical sections as follows: Digital Society Construction and Governance; Modelling and Simulation of Social Systems; Internet Intelligent Algorithm Governance; Social Network and Group Behavior; Innovation, Risks, and Security of Large Language Models; Artificial Intelligence and Cognitive Science; Applications of Large Language Models in Societal Contexts and Social Geography and Urban Computing.

9 特價5219
立即代訂
下次再買

Building Effective Privacy Programs

Wiley 出版
2025/08/13 出版

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications Offers strategies to integrate privacy principles into business processes and IT systems Covers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actions Includes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

9 特價4934
立即代訂
下次再買

AI and Iot: Driving Business Success and Sustainability in the Digital Age

Bahaa,Awwad  著
Springer 出版
2025/08/13 出版
9 特價13049
立即代訂
下次再買

Availability, Reliability and Security

Bart,Coppens  著
Springer 出版
2025/08/11 出版

This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).

9 特價3914
立即代訂
下次再買
頁數2/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing