-
Database Anonymization
Springer 出版The current social and economic context increasingly demands open data to improve scientific resear
-
Privacy Risk Analysis of Online Social Networks
Springer 出版The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedente
-
Analysis Techniques for Information Security
Springer 出版Increasingly our critical infrastructures are reliant on computers. We see examples of such infrast
-
Blocks and Chains
Springer 出版The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchain
-
Computational Modeling of Human Language Acquisition
Springer 出版Human language acquisition has been studied for centuries, but using computational modeling for suc
-
Natural Language Processing for the Semantic Web
Springer 出版This book introduces core natural language processing (NLP) technologies to non-experts in an easil
-
Statistical Language Models for Information Retrieval
Springer 出版As online information grows dramatically, search engines such as Google are playing a more and more
-
Linguistic Structure Prediction
Springer 出版A major part of natural language processing now depends on the use of text data to build linguistic
-
Differential Privacy
Springer 出版Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion
-
Semantic Role Labeling
Springer 出版This book is aimed at providing an overview of several aspects of semantic role labeling. Chapter 1
-
Discourse Processing
Springer 出版Discourse Processing here is framed as marking up a text with structural descriptions on several le
-
Quality Estimation for Machine Translation
Springer 出版Many applications within natural language processing involve performing text-to-text transformation
-
Web Corpus Construction
Springer 出版The World Wide Web constitutes the largest existing source of texts written in a great variety of l
-
Word Association Thematic Analysis
Springer 出版Many research projects involve analyzing sets of texts from the social web or elsewhere to get insi
-
Information Communication
Springer 出版This book introduces fundamentals of information communication. At first, concepts and characterist
-
Digital Libraries Applications
Springer 出版Digital libraries (DLs) have evolved since their launch in 1991 into an important type of informati
-
Scholarly Collaboration on the Academic Social Web
Springer 出版Collaboration among scholars has always been recognized as a fundamental feature of scientific disc
-
Linguistic Fundamentals for Natural Language Processing II
Springer 出版Meaning is a fundamental concept in Natural Language Processing (NLP), in the tasks of both Natural
-
Cross-Lingual Word Embeddings
Springer 出版The majority of natural language processing (NLP) is English language processing, and while there i
-
Recurrent Neural Networks
CRC Press 出版This book comprehensively covers concepts of recurrent neural networks and discusses practical issu
-
The Taxobook
Springer 出版This book is the third of a three-part series on taxonomies, and covers putting your taxonomy into
-
Finite-State Text Processing
Springer 出版Weighted finite-state transducers (WFSTs) are commonly used by engineers and computational linguist
-
Privacy in Social Networks
Springer 出版This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This
-
Efficient Processing of Deep Neural Networks
Springer 出版This book provides a structured treatment of the key principles and techniques for enabling efficie
-
A Social Media Survival Guide
Ingram 出版The every person's guide to social media... how to use it and what never to do. Are you trying to
-
Phrase Mining from Massive Text and Its Applications
Springer 出版A lot of digital ink has been spilled on "big data" over the past few years. Most of this surge owe
-
Cyber Security, Cryptology, and Machine Learning
Springer 出版This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security
-
React and React Native - Fourth Edition
Packt 出版PUBLISHER'S NOTE: An updated 2024 edition of this book, with new emphasis on TypeScript, is now ava
-
Ethical Hacker's Penetration Testing Guide
Ingram 出版Discover security posture, vulnerabilities, and blind spots ahead of the threat actorKey FeaturesIn
-
TCP Congestion Control
Ingram 出版TCP Congestion Control has been a research topic for over 30 years. Since the pioneering work of Ja
-
Fraud Investigation and Forensic Accounting in the Real World
Ingram 出版This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investi
-
Mobile Offensive Security Pocket Guide
Ingram 出版In order to protect and defend mobile application and device deployments, you need to be able to ef
-
Step Into the Metaverse
Wiley 出版An incisive glimpse into the future of the internet In Step into the Metaverse: How the Immersive I
-
Greenedge: New Perspectives to Energy Management and Supply in Mobile Edge Computing
Springer 出版1 Introduction.- 2 Investigating Low-Battery Anxiety of Mobile Users.- 3 User Energy and LBA Aware
-
Purple Team Strategies
Packt 出版Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, d
-
Cloud Computing
Ingram 出版In the past decade, cloud computing and managed infrastructure services have rapidly become the lea
-
A Network Architect’s Guide to 5g
Addison-Wesl 出版THE NETWORK PROFESSIONAL'S GUIDE TO PLANNING, DESIGNING, AND DEPLOYING 5G TRANSPORT NETWORKS As 5G
-
Beyond Accessibility Compliance
Apress 出版Take a deep look at accessibility as it applies to mobile and wearables. This book covers topics wi
-
Basics of Health Blogging
Ingram 出版This book is intended to provide the knowledge of writing blogs to those who haven't been introduce
-
OPNsense Beginner to Professional
Packt 出版Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to sec
-
101 UX Principles - Second Edition
Packt 出版Improve user experience by avoiding common frustrations and focusing on what matters Book Descripti
-
-
Incident Response with Threat Intelligence
Packt 出版Learn everything you need to know to respond to advanced cybersecurity incidents through threat hun
-
Unshakeable & Unapologetic
Lulu.com 出版If you know there's so much more to you & what you're here to share than what you're currently show
-
JavaScript Absolute Beginners Guide
Ingram 出版Make the most of today's JavaScript--even if you've never programmed anything before. JavaScript Ab
-
What to Do When You Get Hacked
Ingram 出版What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century tea
-
Practical WebAssembly
Packt 出版Understand the basic building blocks of WebAssembly and learn, install, and use various tools from
-
Cissp
John Kembrey 出版The book includes additional information on difficult topics as the beginners should have a proper