-
Inside Cyber Warfare
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use c
-
-
AWS Security Cookbook - Second Edition
Packt 出版Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and
-
-
Offensive Security Using Python
Packt 出版Unlock Python's hacking potential and discover the art of exploiting vulnerabilities in the world o
-
IDS and IPS with Snort 3
Packt 出版Learn the essentials of Snort 3.0, including installation, configuration, system architecture, and
-
Sustainable Web Design
Ingram 出版The internet may be digital, but it carries a very physical cost. From image files to colors to cod
-
-
The Richlife
Ingram 出版Do you have enough money? Are you taking care of your family? Do you know what to do with the money
-
-
-
Advances in Cyber Security and Intelligent Analytics
CRC Press 出版The book highlights the challenges faced by emerging paradigms and presents the recent developments
-
Crafting Secure Software
Packt 出版Gain a solid understanding of the threat landscape and discover best practices to protect your soft
-
Privacy-preserving and Untraceable Group Data Sharing Scheme in Cloud
Ingram 出版With the development of cloud computing, the great amount of storage data requires safe and efficie
-
Big Data Analytics in Fog-Enabled IoT Networks
Ingram 出版This book emphasizes and facilitate a greater understanding of various security and privacy approac
-
An Interdisciplinary Approach to Modern Network Security
Ingram 出版An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and tren
-
-
Search Engine Optimization and Marketing
CRC Press 出版This book explains the nuances of Search Engine Optimization (SEO) and Search Engine Marketing (SEM
-
Securing Social Networks in Cyberspace
CRC Press 出版This book collates the key security and privacy concerns faced by individuals and organizations who
-
Occupy the Cyberspace
The central idea is 'the future.' The analysis reveals the fact that uncertainty shall never be an
-
Cybersecurity Issues in Emerging Technologies
Ingram 出版The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing att
-
A Brief History of Cyberspace
Ingram 出版With the Internet, a new space, cyberspace, has formed, been rapidly integrated into daily life, an
-
Urban Analytics with Social Media Data
Ingram 出版The use of data science and urban analytics has become a defining feature of smart cities. This tim
-
Security and Privacy Trends in Cloud Computing and Big Data
Ingram 出版It is essential for an organization to know before involving themselves in cloud computing and big
-
5G Cyber Risks and Mitigation
Ingram 出版5G technology is the next step in the evolution of wireless communication. However, it also introdu
-
-
-
-
-
-
-
Secure Edge Computing
Ingram 出版The internet is making our daily life as digital as possible and this new era is called the Interne
-
Security Awareness Design in the New Normal Age
Ingram 出版This book will primarily consider the problem of hitting that 'Sweet Spot' in the age of 'New Norma
-
Entropy Randomization in Machine Learning
Ingram 出版Entropy Randomization in Machine Learning presents a new approach to machine learning--entropy rand
-
Idiomatic Rust
Ingram 出版Tips, tricks, design patterns, and secret features of Rust that will help you build stable and main
-
Recent Trends in Blockchain for Information Systems Security and Privacy
Ingram 出版The main goal of this book is to encourage both researchers and practitioners of Blockchain technol
-
Designing Secure Systems
Ingram 出版Modern systems are an intertwined mesh of human process, physical security, and technology. Attacke
-
Building AI Applications with OpenAI APIs - Second Edition
Packt 出版Improve your app development skills by building a ChatGPT clone, code bug fixer, quiz generator, tr
-
Opportunistic Networks
Ingram 出版This book provides theoretical, algorithmic, simulation, and implementation-based research developm
-
-
-
-
-
-
Cyber-Security Threats, Actors, and Dynamic Mitigation
Ingram 出版Cyber-security and its related threats change constantly. The book aims at using practical contempo
-
Evidence-Based Cybersecurity
Ingram 出版The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a
-
Secure Data Management for Online Learning Applications
Ingram 出版This book talks about the theoretical frameworks, technical methodologies, Information security, an
-
AI for Business
Ingram 出版Are you tapping into the full potential of artificial intelligence for your business?Discover how C