-
Cybersecurity Explained
Cybersecurity Explained is a comprehensive and accessible guide designed to equip readers with the
-
Lila and Andy learn about Artificial Intelligence
Ingram 出版Are you curious about artificial intelligence? Discover how Large Language Models work with an AI b
-
Acting, Planning, and Learning
AI's next big challenge is to master the cognitive abilities needed by intelligent agents that perf
-
Teaching Using AI
Who This Book Is ForThe Curious But Overwhelmed: You've heard AI is a big deal but don't know where
-
Soft Computing and Its Engineering Applications
Springer 出版The two-volume proceedings set CCIS 2430-2431 constitutes the revised selected papers of the 6th In
-
Attack Surface Management
Ingram 出版Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Address
-
Information Management and Big Data
Springer 出版This book constitutes the proceedings of the 11th Annual International Conference on Information Ma
-
AppSec Mastery
Ingram 出版In an era where information is the cornerstone of any organization, securing it is paramount. "AppS
-
Intelligent Video Analytics
Ingram 出版Intelligent Video Analytics is a guide to mastering modern surveillance technology. This reference
-
ICT Systems Security and Privacy Protection
Springer 出版The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP Intern
-
AI-Enabled Threat Intelligence and Cyber Risk Assessment
Ingram 出版AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential o
-
Defending the Metaverse
Ingram 出版This book is aimed at a diverse audience including students, researchers, academicians, cybersecuri
-
-
Systematic Security
Ingram 出版In today's rapidly evolving digital landscape, safeguarding critical data and systems has never bee
-
-
Systematic Security
Ingram 出版In today's rapidly evolving digital landscape, safeguarding critical data and systems has never bee
-
Security Technologies for Law Enforcement Agencies
Ingram 出版In a rapidly evolving world where technology is increasingly integrated into our daily lives, secur
-
AI-Enabled Threat Intelligence and Cyber Risk Assessment
Ingram 出版AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential o
-
Would You Date Your Website?
Ingram 出版If your website were a person, what kind of impression would they make on a date?Most people have h
-
Learn React Hooks - Second Edition
Packt 出版Grasp the core concepts of React Hooks and enhance your development workflow with best practices an
-
The Web, A Multilingual Encyclopedia
Ingram 出版Unlock the secrets of the digital age with "The Web: A Multilingual Encyclopedia" by Marie Lebert,
-
Holistic IoT Security, Privacy and Safety
The Internet of Things (IoT) is rapidly transforming our world, connecting billions of devices and
-
Modern Web Apps using Rust
Gitforgits 出版This book introduces you to web development with Rust and Leptos. To begin with, you install a soli
-
Cryptography for Payment Professionals
Ingram 出版Although cryptography plays an essential part in most modern solutions, especially in payments, cry
-
Cyber Insecurity
Ingram 出版Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybe
-
Manifesting Violence
Ingram 出版Exposes how white supremacist groups exploit digital platforms to radicalize individualsManifesting
-
Public-Key Cryptography - Pkc 2025
Springer 出版The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR Internat
-
Public-Key Cryptography - Pkc 2025
Springer 出版The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR Internat
-
Public-Key Cryptography - Pkc 2025
Springer 出版The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR Internat
-
Public-Key Cryptography - Pkc 2025
Springer 出版The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR Internat
-
Public-Key Cryptography - Pkc 2025
Springer 出版The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR Internat
-
The ChatGPT Revolution
Ingram 出版Delving into ChatGPT's architecture and ability to generate human-like text, chapters go beyond tec
-
CompTIA CASP+ (CAS-005) Certification Guide
Ingram 出版DESCRIPTION CompTIA Advanced Security Practitioner (CASP+) is a vendor-neutral security certificati
-
Salesforce Security
Ingram 出版Security breaches and data leaks can spell disaster for businesses, jeopardizing finances and erodi
-
Identity Security for Software Development
Ingram 出版Maintaining secrets, credentials, and machine identities in secure ways is an important, though oft
-
Mastering AI for Healthcare
Ingram 出版Harness AI-led Revolution to Deliver Smarter, Faster, and Better Healthcare. Book DescriptionArtifi
-
Information Security and Cryptology
Springer 出版The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th Internation
-
Artificial Intelligence and Applications
Springer 出版This book constitutes the proceedings of the 26th International Conference on Artificial Intelligen
-
-
Terraform for Developers, Second Edition
Gitforgits 出版This is the second edition of the Terraform for Developers book, presenting a thoroughly practical
-
-
-
-
-
-
-
-