-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
-
The Book of Pf, 4th Edition
Build a more secure network with PF. The OpenBSD packet filter, PF, is central to the OpenBSD and
-
The Dark Cloud
Cybersecurity has shifted from a technical footnote to a central crisis of modern life. The Dark Cl
-
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Cyber Defense
Wiley 出版Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to
-
Intelligent Systems with Applications in Communications, Computing and Iot
Springer 出版This book LNICST 621 constitutes the proceedings of the First EAI International Conference on Intel
-
Graph Machine Learning - Second Edition
Packt 出版Enhance your data science skills with this updated edition featuring new chapters on LLMs, temporal
-
How Large Language Models Work
Learn how large language models like GPT and Gemini work under the hood in plain English. How Larg
-
-
-
Stripes Online Organizer
Gooseberry 出版No more slips of paper with passwords jotted down! Gooseberry Patch watercolor artwork makes organi
-
Cyber Secrets
H+ Press 出版The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive tech
-
HCI and Older Adults
Human-Computer Interaction (HCI) has long studied the design of technology for older adults. The co
-
Deepfake Defense for Families
Arm your household against the most convincing lies the internet can conjure. Deepfake Defense for
-
Advanced Content SEO
Unmask the chaos of search engines with Advanced Content SEO: Getting to the Top, No Bullshit. This
-
The Zero-trust Paradigm
Existing measures aimed at securing network perimeters have demonstrated insufficiency in preventin
-
-
Security Analysis and Formal Verification on Blockchain and its Applications
At its core, blockchain is a distributed database that maintains a continuously growing list of rec
-
What It Takes: Speak Up, Step Up, Move Up
Ingram 出版In What It Takes, Amy Henry, a formidable business woman and national star from the original season
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
-
-
Rise of the Machines
Wiley 出版Expert guide to create Zero Trust digital environments in an AI-everywhere landscape Rise of the
-
-
-
Resilience in Edge Computing
Computing paradigms have continuously evolved to address the growing demands of modern applications
-
Gradient-Based Algorithms for Zeroth-Order Optimization
This monograph deals with methods for stochastic or data-driven optimization. The overall goal of t
-
Recommender Systems Meet Large Language Model Agents
The integration of Large Language Models (LLM) and Recommender Systems (RS) has marked a transforma
-
Distributed Computer and Communication Networks
Springer 出版The proceedings constitute papers presented in the 27th International Conference, DCCN 2024, held i
-
傳承-台塑王朝的變與不變
達人館 出版活在未來的王永慶他看見未來的速度總是比別人快,少了他的台塑王朝,下一個決勝關鍵會是在哪?本書由作者與年代新聞台「聚焦360度」節目主持人高文音的對談揭開序幕,以新聞式的報導、圖表式的整理,直擊台塑的
-
-
-
Manifesting Violence
When communication becomes the engine of white supremacist violence. Manifesting Violence: White Te
-
Manifesting Violence
Exposes how white supremacist groups exploit digital platforms to radicalize individuals Manifestin
-
-
-
-
-
Securing the AWS Cloud
Wiley 出版Make your next Amazon Web Services deployment secure and private Dive into the world of cloud sec
-
-
-
Fundamentals of Digital Forensics
Springer 出版This textbook describes the theory and methodology of digital forensic examinations, presenting exa
-
-
-