-
-
Security and Trust Management
Springer 出版This book constitutes the refereed proceedings of the 20th International Workshop on Security and T
-
The Hundred-Page Language Models Book
Master language models through mathematics, illustrations, and code―and build your own from s
-
-
-
AI for Beginners
Are you ready for the truth about our rapidly changing workplace?AI for Beginners is your clear, pr
-
Bold & Easy Life in a Jar Coloring Book
Laura Bidden 出版Experience the joy of coloring with the Bold & Easy Life in a Jar Coloring Book, a delightful colle
-
Metasploit, 2nd Edition
The new and improved guide to penetration testing using the legendary Metasploit Framework. Metaspl
-
Advances in Digital Forensics XX
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Cyber Threat Hunting
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of
-
The Facebook Paradox
Ever felt strangely connected and utterly alone at the same time? That's the Facebook paradox. This
-
Security, Privacy, and Applied Cryptography Engineering
Springer 出版This book constitutes the refereed proceedings of the 14th International Conference on Security, Pr
-
Advances in Cryptology - ASIACRYPT 2024
Springer 出版The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Co
-
The Cybersecurity Professional's Guide to Network Defense
Are your defenses strong enough to withstand today's advanced cyber threats? Do you have the strate
-
Building Secure Applications
Are your network services truly secure? Could your applications withstand today's evolving threats?
-
Podcast Studies
Ingram 出版Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in acade
-
Non-Line-Of-Sight Ultraviolet Communications
Springer 出版This book provides a comprehensive review and the latest progress of ultraviolet communications. Op
-
-
Advances in Cryptology - Asiacrypt 2024
Springer 出版The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Co
-
Cyber Recon
Wiley 出版An up close and personal look at cyber espionage and digital spycraft In Cyber Recon: My Life in Cy
-
Advanced Cybersecurity Solutions
Ingram 出版Advanced Cybersecurity Solutions - Your Shield in the Digital StormThe cybersecurity battleground i
-
Advances in Secure IoT Data Sharing
The proliferation of IoT devices on the internet is currently in the billions, and projections anti
-
The Dark Side of Networking
How do hackers exploit network vulnerabilities with precision? Are your systems truly secure agains
-
Expert Network Analysis
Are you ready to unlock the full potential of network analysis tools? Ever wondered how professiona
-
Networking Protocols Unleashed
Are you ready to master the art of networking? Have you ever wondered what sets expert hackers apar
-
The Dark Side of Networking
How vulnerable are the connected systems you rely on daily?Are you prepared to defend against the e
-
Steganography - The Art of Hiding Information
Intechopen 出版This book provides a selection of chapters on the subject of steganography. Steganography is the pr
-
Cognitive Computing - ICCC 2024
Springer 出版This book constitutes the refereed proceedings of the 8th International Conference on Cognitive Com
-
Navigating the Soundscape of Deception
The rise of audio deepfakes presents a significant security threat that undermines trust in digital
-
-
-
Cybersecurity's Next Frontier
"Cybersecurity's Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide" is a
-
-
The Hacker's Guide to Industrial Network Security
Are industrial networks truly secure against today's sophisticated cyber threats? Do you have the e
-
Cybersecurity Frontiers
Have you ever wondered how emerging network protocols shape the future of cybersecurity? Are you pr
-
Hacking the Wireless World
How secure is your wireless network? Are you prepared to exploit vulnerabilities or protect against
-
Advanced Network Hacking
Are you ready to uncover the hidden vulnerabilities in modern networks? Curious about how cyber war
-
-
Pricai 2024: Trends in Artificial Intelligence
Springer 出版The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st
-
Fluent in AI
Master the human-AI partnership-and then teach students to do the same.In Fluent in AI, Aaron S. La
-
Machine Learning for Spectrum Sharing
The 5th generation (5G) of wireless systems is being deployed with the aim to provide many sets of
-
Cryptocurrencies - Financial Technologies of the Future
Intechopen 出版Money is undoubtedly the fundamental element of the economy, and its history reflects the evolution
-
Evaluation of the Comparison Between Digital Marketing Strategies
Ingram 出版This evaluation examines the differences in digital marketing strategies employed by local and inte
-
Information Technology for Peace and Security
Technological and scientific progress, especially the rapid development in information technology (
-
The Routledge Handbook of Privacy and Social Media
Routledge 出版This volume provides the basis for contemporary privacy and social media research and informs globa
-
Cyber Warfare, Security and Space Computing
Springer 出版This book constitutes selected papers from the Second International Conference on Cyber Warfare, Se
-
Writing for Developers
Pragmatic methods for writing blogs, articles, and other technical pieces that stand out from the c
-
How AI Will Shape Our Future
"A fascinating journey into the future of AI, providing a unique perspective that combines technolo