-
The Podcast Pantheon
Spanning the most popular podcast genres--true crime, comedy, sports, relationships, and more--cult
-
Computer Safety, Reliability, and Security. Safecomp 2025 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with the 44th Internatio
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the refereed proceedings of the 44th International Conference on Computer Saf
-
The Social Media Trap - How to Protect Your Mental Health in a Digital World
Social media was designed to connect us-but for many, it's doing the opposite. Anxiety, comparison,
-
Advanced Technologies in Electronics, Communications and Signal Processing
Springer 出版This book LNICST 620 constitutes the proceedings of the First EAI International Conference on Advan
-
Advanced Technologies in Electronics, Communications and Signal Processing
Springer 出版This book LNICST 619 constitutes the proceedings of the First EAI International Conference on Advan
-
Dark Web Reality
Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret
-
Dark Web Reality
Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Understanding Artificial Intelligence
"Understanding Artificial Intelligence: Fundamentals and Applications" is an essential resource des
-
Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide
As cloud technology becomes increasingly essential across industries, the need for thorough securit
-
Learning Ransomware Response & Recovery
Ransomware attacks are no longer a question of if--it's a matter of when. With hackers increasingly
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Guardians of the Digital Age
CRC Press 出版The internet wasn't built for time travelers. But when ethical hacker and mother Elsa and her 14-ye
-
Understanding the Human Factor in Cyber Security
Ingram 出版In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in
-
Wireshark Essentials
CRC Press 出版Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utili
-
The Cyber Shield
FriesenPress 出版Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the
-
The Cyber Shield
FriesenPress 出版Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the
-
Traditional vs Generative AI Pentesting
CRC Press 出版Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving lands
-
Guardians of the Digital Age
CRC Press 出版The internet wasn't built for time travelers. But when ethical hacker and mother Elsa and her 14-ye
-
Intelligent Approaches to Cyber Security
CRC Press 出版Intelligent Approach to Cyber Security provides details on the important cyber security threats and
-
Machine Learning and Deep Learning in Natural Language Processing
CRC Press 出版This book aims at providing a review of current Neural Network techniques in the NLP. The book is i
-
Traditional vs Generative AI Pentesting
CRC Press 出版Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving lands
-
-
Big Data and Social Computing
Springer 出版This book constitutes the refereed proceedings of the 10th China National Conference on Big Data an
-
Building Effective Privacy Programs
Wiley 出版Presents a structured approach to privacy management, an indispensable resource for safeguarding da
-
Modern REST API Development in Go
Packt 出版Master REST API design in Go in a pragmatic way by building production-ready web services using the
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conferen
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conferen
-
The Computer Security Workbook
Springer 出版Mastering computer security requires more than just technical knowledge of software, systems and ne
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Sympo
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Sympo
-
-
Performance Evaluation and Analysis of Effective Range and Data Throughput for Unmodified Bluetooth Communication Devices
Ingram 出版The DoD and the Air Force continually seek to incorporate new technology in an effort to improve co
-
Empowering Marine Corps System Administrators
Ingram 出版Organizations cannot protect the integrity, confidentiality, and availability of information in tod
-
Early Warning and Prediction of Internet Attacks and Exploits
Ingram 出版A safe, secure and functional information network is vital in today's Air Force net centric environ
-
DoD Role for Securing United States Cyberspace
The cyber attacks on Estonia in late April and the early weeks of May 2007 significantly crippled t
-
Heuristically Driven Search Methods for Topology Control in Directional Wireless Hybrid Networks
Information and Networked Communications play a vital role in the everyday operations of the United
-
Mitigating TCP Degradation Over Intermittent Link Failures Using Intermediate Buffers
This thesis addresses the improvement of data transmission performance in a challenged network. It
-
Engaging Cyber Communities
There are 1.7 billion Internet users worldwide as of October, 2009 and growing. The dramatic growth