-
AI and ADA
Ingram 出版Preface The book's Preface places the current AI explosion in the context of other technological ca
-
AI and ADA
Preface The book's Preface places the current AI explosion in the context of other technological ca
-
The $10 Million Instagram Funnel
Brian Mark shares the proven strategies used to grow a thriving online coaching company without pai
-
The $10 Million Instagram Funnel
In $10 Million Instagram Funnel, Brian Mark shares the proven strategies he used to grow a thriving
-
Cybersecurity Mistakes for SMBs to avoid
Acrasolution 出版Cybersecurity Mistakes to Avoid: How to Protect Your Small Business from Costly ThreatsMost busines
-
The Podcast Pantheon
Spanning the most popular podcast genres--true crime, comedy, sports, relationships, and more--cult
-
Computer Safety, Reliability, and Security. Safecomp 2025 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with the 44th Internatio
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the refereed proceedings of the 44th International Conference on Computer Saf
-
Dark Web Reality
Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret
-
Advanced Technologies in Electronics, Communications and Signal Processing
Springer 出版This book LNICST 620 constitutes the proceedings of the First EAI International Conference on Advan
-
Advanced Technologies in Electronics, Communications and Signal Processing
Springer 出版This book LNICST 619 constitutes the proceedings of the First EAI International Conference on Advan
-
Dark Web Reality
Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Understanding Artificial Intelligence
"Understanding Artificial Intelligence: Fundamentals and Applications" is an essential resource des
-
Learning Ransomware Response & Recovery
Ransomware attacks are no longer a question of if--they're a matter of when. With hackers increasin
-
Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide
As cloud technology becomes increasingly essential across industries, the need for thorough securit
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Guardians of the Digital Age
CRC Press 出版A thrilling bridge between past and future, this book introduces parents and teens to the evolution
-
Understanding the Human Factor in Cyber Security
Ingram 出版In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in
-
Wireshark Essentials
CRC Press 出版Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utili
-
The Cyber Shield
FriesenPress 出版Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the
-
The Cyber Shield
FriesenPress 出版Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the
-
Traditional vs Generative AI Pentesting
CRC Press 出版Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving lands
-
Machine Learning and Deep Learning in Natural Language Processing
CRC Press 出版Natural Language Processing (NLP) is a sub-field of Artificial Intelligence, linguistics, and compu
-
Guardians of the Digital Age
CRC Press 出版A thrilling bridge between past and future, this book introduces parents and teens to the evolution
-
Intelligent Approaches to Cyber Security
CRC Press 出版Intelligent Approach to Cyber Security provides details on the important cyber security threats and
-
Traditional vs Generative AI Pentesting
CRC Press 出版Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving lands
-
Data Engineering for Cybersecurity
Turn raw logs into real intelligence. Security teams rely on telemetry--the continuous stream of lo
-
-
Big Data and Social Computing
Springer 出版This book constitutes the refereed proceedings of the 10th China National Conference on Big Data an
-
Building Effective Privacy Programs
Wiley 出版Presents a structured approach to privacy management, an indispensable resource for safeguarding da
-
Modern REST API Development in Go
Packt 出版Master REST API design in Go in a pragmatic way by building production-ready web services using the
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conferen
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conferen
-
The Computer Security Workbook
Springer 出版Mastering computer security requires more than just technical knowledge of software, systems and ne
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Sympo
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Availability, Reliability and Security
Springer 出版This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Sympo
-
-
Performance Evaluation and Analysis of Effective Range and Data Throughput for Unmodified Bluetooth Communication Devices
Ingram 出版The DoD and the Air Force continually seek to incorporate new technology in an effort to improve co
-
Empowering Marine Corps System Administrators
Ingram 出版Organizations cannot protect the integrity, confidentiality, and availability of information in tod
-
Early Warning and Prediction of Internet Attacks and Exploits
Ingram 出版A safe, secure and functional information network is vital in today's Air Force net centric environ