-
Machine Learning
Ingram 出版For sales in India check Indian online stores.Thank you for being part of the technological world t
-
Better Onboarding
Ingram 出版When users try your product or service for the first time, what encourages them to come back? Onboa
-
From Street-Smart to Web-Wise(r)
Ingram 出版"From Street-smart to Web-wise(R) A Safety Training Manual Built for Teachers and Designed for Chil
-
A Reference Manual for Data Privacy Laws and Cyber Frameworks
Ingram 出版As the world is becoming more digital and entwined together, the cybersecurity threat landscape has
-
-
Cybersecurity Simplified
Ingram 出版In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurit
-
From Street-Smart to Web-Wise(r)
Ingram 出版In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring
-
Phishing for Answers
Ingram 出版In the context of information security, social engineering is the manipulation of people into perfo
-
A Reference Manual for Data Privacy Laws and Cyber Frameworks
Ingram 出版In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a
-
The Art of Cyber Defense
Ingram 出版The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive explor
-
-
Mastering Honeypots
Ingram 出版DESCRIPTION Honeypots are like digital traps designed to lure malicious attackers away from your re
-
Cryptology and Network Security
Springer 出版This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conf
-
Serious Cryptography, 2nd Edition
Ingram 出版Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave t
-
The Ciso Playbook
Ingram 出版The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and com
-
Generative AI and Cyberbullying
Ingram 出版Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For ex
-
The Scaling Era
Ingram 出版An inside view of the AI revolution, from the people and companies making it happen. How did we b
-
The Ciso Playbook
Ingram 出版The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and com
-
Generative AI and Cyberbullying
Ingram 出版Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For ex
-
Integration of Heterogeneous Wireless Networks to Compose 5G Networks
Ingram 出版This book covers the main forms of wireless network connectivity and how their integration is influ
-
AWS Cloud Projects
Packt 出版Build eight real-world applications and gain hands-on expertise with AWS servicesKey Features: - Ga
-
Unveiling NIST Cybersecurity Framework 2.0
Packt 出版Launch and enhance your cybersecurity program by adopting and implementing the NIST Cybersecurity F
-
Cryptology and Network Security
Springer 出版This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conf
-
Modern Network Observability
Packt 出版Learn how to use modern monitoring tools for building network observability solutions that enhance
-
Energy Efficiency in WSN by Employing Cluster to Head Noise Protocol
Ingram 出版The wireless sensor networks is the decentralized and self configuring type of network in which sen
-
-
-
Methods for ensuring security in big data (Big Data)
Ingram 出版This paper considers the basic concepts and principles of data security and their importance for th
-
ITIL 4 Digital and IT Strategy (DITS)
Ingram 出版This guide contains everything you need to know to pass the ITIL 4(R) Strategic Leader Digital and
-
Crafting Ransomware
Ingram 出版Crafting Ransomware: A Python Developer's GuideSubtitle: Developing and Testing Ransomware in Pytho
-
The Cybersecurity Mesh Architecture
Ingram 出版DESCRIPTION Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects a
-
Spies in the Bits and Bytes
Ingram 出版In an era where digital security transcends mere convenience to become a pivotal aspect of our dail
-
Spies in the Bits and Bytes
Ingram 出版In an era where digital security transcends mere convenience to become a pivotal aspect of our dail
-
Resilient Cybersecurity
Packt 出版Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey Fea
-
Detecting Security Vulnerability in Web Applications
Ingram 出版In this research work, we presented a new XSS defense strategy framework based on soft-computing ap
-
Adoption de services d'informatique en nuage et performance de la cha簾ne d'approvisionnement
Ingram 出版Cet ouvrage de recherche 矇tudie de mani癡re empirique l'influence de l'adoption des services de clou
-
Einf羹hrung von Cloud Computing-Diensten und Leistung der Lieferkette
Ingram 出版In diesem Buch wird empirisch untersucht, welchen Einfluss die Einf羹hrung von Cloud Computing-Diens
-
Ado癟瓊o de servi癟os de computa癟瓊o em nuvem e desempenho da cadeia de abastecimento
Ingram 出版Este livro de investiga癟瓊o investigou empiricamente a influ礙ncia da ado癟瓊o de servi癟os de computa癟瓊
-
Adozione di servizi di cloud computing e performance della catena di fornitura
Ingram 出版Questo libro di ricerca ha analizzato empiricamente l'influenza dell'adozione dei servizi di cloud
-
Data Analysis using Python and Power BI
Ingram 出版Data analysis using Python and Power BI has become a powerful combination for extracting insights f
-
Skunks, Bogies, Silent Hounds, and the Flying Fish
Ingram 出版The Vietnam War continues to cast a long shadow over American history and the world's understanding
-
Mastering LLM Applications with LangChain and Hugging Face
Ingram 出版DESCRIPTION The book is all about the basics of NLP, generative AI, and their specific component LL
-
The Content to Cash Bible
Ingram 出版In today's digital world, content is king-but cash is the crown. "The Content to Cash Bible" is you
-
The Content to Cash Bible
Ingram 出版In today's digital world, content is king-but cash is the crown. "The Content to Cash Bible" is you
-
-
Cybersecurity in Italy
Springer 出版This book presents a detailed and innovative analysis of the governance, policies and ecosystem tha
-
Inside Cyber Warfare
Ingram 出版Get a fascinating and disturbing look into how state and nonstate actors throughout the world use c
-
The Language of Cyber Attacks
Bloomsbury 出版Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with