-
Public Relations in the Digital Age
This book explores the evolving landscape of PR in an era shaped by social media, instant communica
-
Agentic AI and the Future of Work
Ingram 出版'As AI continues to evolve, one of the most talked-about and impactful advancements across industri
-
Information Security
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security Education
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Advancements In Smart Card And Biometric Technology
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security Education
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Learning API Styles
An application programming interface (API) enables data exchange in systems such as web application
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Cyber Forensics and Digital Security
In today's hyperconnected world, where digital transformation accelerates at an unprecedented pace,
-
Practical Cloud Security Handbook
As organizations rapidly migrate to cloud environments, robust cloud security is no longer optional
-
The Collaborative Coder
The digital revolution has redefined the boundaries of software development, transforming it into a
-
Llmops
Here's the thing about large language models: they don't play by the old rules. Traditional MLOps c
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Establishing Security Operations Center
Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Artificial Intelligence in Image Processing
Artificial Intelligence in Image Processing: Concepts, Techniques, and Applications provides a comp
-
Certified Ethical Hacker (Ceh) Study Guide
The CEH exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing ex
-
Military Operations in Cyberspace
In the book cyberspace capabilities, threats, and attacks are described. The principles of the cybe
-
Computer Networks
The book computer Networks provides a comprehensive introduction to the concepts and principles of
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping in
-
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping in
-
Privacy and Security for Large Language Models
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully review
-
-
The vCISO Playbook
The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Bu
-
The Future of Hacking
In a world, where cyber threats evolve daily, the line between hacker and hero is thinner than you
-
You Have a New Memory
NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural critici
-
Artificial Intelligence Paradigms for Application Practice
CRC Press 出版This book proposes practical application paradigms for deep neural networks, aiming to establish be
-
-
Wireless Sensor Network Security
Ingram 出版Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies