-
The Language of Machines
Ingram 出版This book offers a clear, accessible guide to the inner workings and real-world impact of large lan
-
Computer Network LAB
Networking refers to the practice of connecting computers and other devices to share resources, exc
-
Energy and Throughput Optimization in NB-IoT Networks
This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and
-
Self-Healing Networks and Resilient Architectures
This book explores the emerging paradigm of self-healing networks-digital infrastructures that can
-
IoT Security using VHDL
Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection ag
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Navigating the Digital Maze
Ingram 出版Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections b
-
Navigating the Digital Maze
Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections b
-
Learning Kubernetes Security - Second Edition
Packt 出版Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implem
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Social First Brands
Kogan Page 出版How can you build a social media strategy that outlasts trends and delivers real impact? Social Fir
-
Social First Brands
Kogan Page 出版How can you build a social media strategy that outlasts trends and delivers real impact? Social Fir
-
-
Prompting Made Simple
Ingram 出版UNLOCK THE POWER OF WORDS IN THE AGE OF AIYou don't need to code, you just need to know how to ask
-
Computers and Their Applications
Springer 出版This book constitutes the proceedings of the 40th International Conference on Computers and Their A
-
6gn for Future Wireless Networks
Springer 出版This volume set constitutes the proceedings of the 7th EAI International Conference on 6GN for Futu
-
Introduction to Modern Cryptography
CRC Press 出版Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides
-
High-Speed Large Capacity Optical Fiber Communications
Springer 出版This book systematically explores the synergistic integration of multidimensional modulation and co
-
-
The CISO 3.0
CRC Press 出版This isn't just a book. It is a roadmap for the next generation of cybersecurity leadership. In an
-
Data and Applications Security and Privacy XXXIX
Springer 出版This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data a
-
Securing the Digital Frontier
Ingram 出版Cyber space is easily the most complex thing humans have ever created. With billions of people and
-
-
The Ciso 3.0
CRC Press 出版This isn't just a book. It is a roadmap for the next generation of cybersecurity leadership. In an
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Practical Deep Learning, 2nd Edition
Deep learning made simple. Dip into deep learning without drowning in theory with this fully update
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Foundations and Practice of Security
Springer 出版This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Fou
-
Cyber Secrets
H+ Press 出版The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive technolo
-
-
Learning Web Design
O’Reilly Me 出版Do you want to build web pages but have no prior experience? This friendly guide is the perfect pla
-
Introduction to Cryptographic Definitions
Springer 出版Cryptographic definitions are often abstract and complex, making them challenging for beginners to
-
The Ultimate ChatGPT Prompt Book
Discover the easiest way to leverage artificial intelligence with these 750+ ready-to-use ChatGPT p
-
Podcast Studies
Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in acade
-
SEO That Gets You Seen
Kevluck 出版SEO That Gets You Seen is a field guide for business owners who are tired of being invisible online
-
Principle of Architecture, Protocol, and Algorithms for Cog-Min
Springer 出版The Internet is the most important global infrastructure in the digital economy era. Its role has s
-
Advanced Networking Technologies
Advanced networking methods and technologies are emerging as critical components in enabling novel
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Cybersecurity
Springer 出版This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conferenc
-
Online Hate Speech
Springer 出版This book informs readers on how to understand, detect, and mitigate hate speech in online social m
-
Considerate Content
Lulu.com 出版Rebekah Barry draws on her experience of doing research with people with wide-ranging needs, showin
-
ISO/IEC 27001 meets the NIS2 EU Directive - A Practical Guide to Achieving Conformity
Lulu.com 出版A structured, erudite, and practical guide for aligning ISO/IEC 27001:2022 with the legal obligatio
-
ISO/IEC 27001 Meets the SOX 404 Risk Assessment - A Cross-Domain Risk Reference
Lulu.com 出版A practical reference for bridging ISO/IEC 27001 and SOX 404. This book offers a clear, structured
-
Reengineering Cyber Security Process
de Gruyter 出版In today's rapidly evolving information technology landscape, cyber-attacks on company assets and I