-
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 21st International Conference on Detection of Intrusio
-
Big Data and Security
Springer 出版The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big
-
Responsive Web Development
Ingram 出版Bridging web and mobile for next-gen user experiencesDESCRIPTION The book explores how modern web a
-
Adaptive Neuro-Fuzzy Inference System as a Universal Estimator
Ingram 出版This book presents some recent specialized works of a theoretical study in the domain of adaptive n
-
-
Elevate Your Productivity Using ChatGPT
Ingram 出版Unlock the Secrets of Artificial Intelligence with a Deep Dive into ChatGPT's Revolutionary Mechani
-
-
Mastering Gemini Artificial Intelligence Prompting for Google Workspace
Ingram 出版Explore the transformative capabilities of Gemini AI within Google Workspace in this essential guid
-
-
-
Learning Devsecops
Ingram 出版How can organizations integrate security while continuously deploying new features? How can some ma
-
-
-
-
Selected Areas in Cryptography
Springer 出版This book constitutes the refereed post-conference proceedings of the 29th International Conference
-
Shadow Codes
Ingram 出版Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Dig
-
-
-
Encrypted Network Traffic Analysis
Springer 出版This book provides a detailed study on sources of encrypted network traffic, methods and techniques
-
-
-
-
Practical XML Programming - Build and Deploy Web Apps
Ingram 出版Welcome to "Practical XML Programming - Build and Deploy Web Apps"! In the present era of the digit
-
-
-
Combatting Cyber Terrorism
Ingram 出版In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A
-
Network Automation with Nautobot
Packt 出版Transform the way your network teams think about and deploy enterprise network automation through t
-
Critical Infrastructure Security
Packt 出版Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infras
-
-
Information and Communications Technologies
Springer 出版This book constitutes the proceedings of the Second International Libyan Conference on Information
-
Post-Quantum Cryptography
Springer 出版The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th Int
-
Post-Quantum Cryptography
Springer 出版The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th Int
-
-
Tales from the Cyber Crypt
Ingram 出版Spoof-Proof Yourself The future belongs to the cyber-resilient. Whether you're an individual naviga
-
-
-
-
-
Insecure Digital Frontiers
Ingram 出版'Insecure Digital Frontiers' is an immersive exploration into the tumultuous realm of cybersecurity
-
Endpoint Detection and Response Essentials
Packt 出版Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts th
-
-
Demystifying Large Language Models
Ingram 出版This book is a comprehensive guide aiming to demystify the world of transformers -- the architectur
-
Learning Subsequential Transducers. A Categorical Approach
Ingram 出版Master's Thesis from the year 2024 in the subject Computer Sciences - Artificial Intelligence, Univ
-
-
-
-
The Inevitable Ai
Ingram 出版Just like the discovery of fire catapulted humanity from cave dwellers to space explorers, AI promi