-
ChatGPT Prompts
Ingram 出版Unlock the full potential of ChatGPT and revolutionize your interactions!Have you heard about the i
-
Enhancing Deep Learning with Bayesian Inference
Packt 出版Develop Bayesian Deep Learning models to help make your own applications more robust.Key Features:
-
Mastering Microsoft 365 Defender
Packt 出版Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident
-
Automating and Orchestrating Networks with Netdevops
Cisco Press 出版Master a holistic approach to NetDevOps--from concepts to practical implementation This is your com
-
Google Cloud Platform (Gcp) Professional Cloud Network Engineer Certification Companion
Apress 出版While many guides exist to help software engineers learn cloud networking design and architecture c
-
Labyrinth of Ruins
The Hekatompathia (1582), the first English sonnet sequence, surprises its readers with a cryptogra
-
-
The Bitcoin Memoir
Lulu.com 出版...understanding the blockchain revolution... Learn the story from Bitcoin's perspective! "If you a
-
The Birth of Meme Coins
Ingram 出版Are you ready to dive into the fascinating world of meme coins? Before you invest a single dollar,
-
-
Enabling Microservice Success
Ingram 出版Microservices can be a very effective approach for delivering value to your organization and to you
-
-
Technological Innovation for Connected Cyber Physical Spaces
Springer 出版This book constitutes the refereed proceedings of the 14th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Practical Threat Detection Engineering
Packt 出版Go on a journey through the threat detection engineering lifecycle while enriching your skill set a
-
Software Supply Chain Security
Trillions of lines of code help us in our lives, companies, and organizations. But just a single so
-
The United States Government Internet Directory 2023
Ingram 出版The United States Government Internet Directory serves as a guide to the changing landscape of gove
-
Perfect Phrases for Writing Grant Proposals
McGraw-Hill 出版The Right Phrase for Every Situation...Every Time These days, it's not enough to work for a good ca
-
How to Catch a Phish
Apress 出版Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybe
-
Artificial Intelligence, Real Profits
Ingram 出版Unlock the Power of AI: Revolutionize Your Marketing Strategy with "Artificial Intelligence, Real P
-
Think Like a UX Researcher
Ingram 出版Think Like a UX Researcher will challenge your preconceptions about user experience (UX) research
-
Cybersecurity for Decision Makers
CRC Press 出版This book is aimed at managerial decision-makers, practitioners in any field, and the academic comm
-
System Design Interview - An Insider's Guide
System Design Interview - An Insider's Guide (Volume 2) This book can be seen as a sequel to the b
-
Intelligent Analysis of Fundus Images
Ingram 出版This comprehensive compendium designs deep neural network models and systems for intelligent analys
-
How to Be a Web Developer
Apress 出版This complete beginner's guide is for anyone interested in becoming a web developer. Aimed at those
-
Advances in Cryptology - Crypto 2023
Springer 出版The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedin
-
Advances in Cryptology - Crypto 2023
Springer 出版The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedin
-
Advances in Cryptology - Crypto 2023
Springer 出版The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedin
-
Research and Education in Urban History in the Age of Digital Libraries
Springer 出版This book constitutes refereed proceedings of the Third International Workshop on Research and Educ
-
Introduction to Tensor Computing in Python
Ingram 出版Tensorised deep learning models compress large models using fewer parameters that are easier to exp
-
-
Understand, Manage, and Measure Cyber Risk
Apress 出版When it comes to managing cybersecurity in an organization, most tussle with basic foundational com
-
-
The Future of AI-Driven Crypto Investing
PN Books 出版Are you tired of using outdated trading strategies and feeling like you're always one step behind i
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 20th International Conference on Detection of Intrusio
-
Critical Information Infrastructures Security
Springer 出版This book constitutes the refereed proceedings of the 17th International Conference on Critical Inf
-
ChatGPT Prompts
Ingram 出版Unlock the full potential of ChatGPT and revolutionize your interactions!Have you heard about the i
-
Analysis, Cryptography and Information Science
Ingram 出版This compendium focuses on self-contained presentations of various developments in mathematical ana
-
The Psychology of Insider Risk
Ingram 出版Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psycholo
-
Chinese Next-Generation Psychological Warfare
Ingram 出版This report explores Chinese military thinking about next-generation psychological warfare, with a
-
The Psychology of Insider Risk
Ingram 出版Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psycholo
-
Svelte with Test-Driven Development
Packt 出版Build robust and performant applications by developing SvelteKit applications using automated testi
-
Cybersecurity for Entrepreneurs
Ingram 出版One data breach can close a small business before it even gets going. With all that is involved in
-
Java: A Beginner's Guide, Tenth Edition
Ingram 出版A hands-on introduction to Java programming--fully revised for the latest version, Java SE 21 Thoro
-
Ict Systems Security and Privacy Protection
Springer 出版This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on I
-
Technological Innovation for Digitalization and Virtualization
Springer 出版This book constitutes the refereed proceedings of the 13th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Python for Security and Networking - Third Edition
Packt 出版Gain a firm, practical understanding of securing your network and utilize Python's packages to dete
-
Cognitive Security
Springer 出版This book presents the latest research in cognitive security, a rapidly emerging field that address
-
Privacy and Identity Management
Springer 出版This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte