-
-
Advanced Cybersecurity Solutions
Ingram 出版Advanced Cybersecurity Solutions - Your Shield in the Digital Storm The cybersecurity battleground
-
Cyber Recon
Wiley 出版An up close and personal look at cyber espionage and digital spycraft In Cyber Recon: My Life in
-
Advances in Secure IoT Data Sharing
The proliferation of IoT devices on the internet is currently in the billions, and projections anti
-
The Dark Side of Networking
Ingram 出版How vulnerable are the connected systems you rely on daily?Are you prepared to defend against the e
-
The Dark Side of Networking
How do hackers exploit network vulnerabilities with precision? Are your systems truly secure again
-
Expert Network Analysis
Are you ready to unlock the full potential of network analysis tools? Ever wondered how profession
-
Networking Protocols Unleashed
Ingram 出版Are you ready to master the art of networking? Have you ever wondered what sets expert hackers apa
-
Steganography - The Art of Hiding Information
Intechopen 出版This book provides a selection of chapters on the subject of steganography. Steganography is the pr
-
Cognitive Computing - ICCC 2024
Springer 出版This book constitutes the refereed proceedings of the 8th International Conference on Cognitive Com
-
Navigating the Soundscape of Deception
The rise of audio deepfakes presents a significant security threat that undermines trust in digital
-
-
-
-
Cybersecurity's Next Frontier
"Cybersecurity's Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide" is a
-
Advanced Network Hacking
Are you ready to uncover the hidden vulnerabilities in modern networks? Curious about how cyber wa
-
The Hacker's Guide to Industrial Network Security
Are industrial networks truly secure against today's sophisticated cyber threats? Do you have the
-
Hacking the Wireless World
How secure is your wireless network? Are you prepared to exploit vulnerabilities or protect agains
-
Cybersecurity Frontiers
Have you ever wondered how emerging network protocols shape the future of cybersecurity? Are you p
-
-
Pricai 2024: Trends in Artificial Intelligence
Springer 出版The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st
-
Pricai 2024: Trends in Artificial Intelligence
Springer 出版The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st
-
Fluent in AI
Ingram 出版Master the human-AI partnership-and then teach students to do the same. In Fluent in AI, Aaron S. L
-
-
Machine Learning for Spectrum Sharing
The 5th generation (5G) of wireless systems is being deployed with the aim to provide many sets of
-
Cryptocurrencies - Financial Technologies of the Future
Intechopen 出版Money is undoubtedly the fundamental element of the economy, and its history reflects the evolution
-
Evaluation of the Comparison Between Digital Marketing Strategies
Ingram 出版This evaluation examines the differences in digital marketing strategies employed by local and inte
-
The Routledge Handbook of Privacy and Social Media
Routledge 出版This volume provides the basis for contemporary privacy and social media research and informs globa
-
Information Technology for Peace and Security
Technological and scientific progress, especially the rapid development in information technology (
-
Cyber Warfare, Security and Space Computing
Springer 出版This book constitutes selected papers from the Second International Conference on Cyber Warfare, Se
-
Writing for Developers
Pragmatic methods for writing blogs, articles, and other technical pieces that stand out from the c
-
How AI Will Shape Our Future
"A fascinating journey into the future of AI, providing a unique perspective that combines technolo
-
API Design
From Monolithic Applications to Microservices, The Evolution of APIs explores the history, principl
-
Stabilization, Safety, and Security of Distributed Systems
Springer 出版This book constitutes the proceedings of the 26th International Symposium on Stabilization, Safety,
-
Future Access Enablers for Ubiquitous and Intelligent Infrastructures
Springer 出版This book constitutes the refereed post-conference proceedings of the 8th EAI International Confere
-
Secret History
CRC Press 出版Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books p
-
Cybersecurity Tabletop Exercises
The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop ex
-
Social Media Strategy
Social Media Strategy: Algorithms That Work for You Social Media Strategy: Algorithms That Work for
-
-
Beginning Vue 3 Development
Greg Lim 出版In this book, we take you on a fun, hands-on and pragmatic journey to quickly learn Vue and get fam
-
HTMX Crash Course
Greg Lim 出版In this book, we take you on a fun, hands-on crash course to learning HTMX. You'll start building y
-
React Crash Course (Updated to React 19)
Greg Lim 出版Updated to React 19. Developed by Facebook, React is one of the leading frameworks to build efficie
-
-
-
Modern Cryptography
Security professionals, you know encryption is essential to protect your data. In this book, learn
-
The Language of Cyber Attacks
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with
-
Machine Learning and Intelligent Communication
Springer 出版This book constitutes the refereed post-conference proceedings of the 8th EAI International Confere
-