-
The vCISO Playbook
The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Bu
-
The Future of Hacking
In a world, where cyber threats evolve daily, the line between hacker and hero is thinner than you
-
You Have a New Memory
NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural critici
-
Artificial Intelligence Paradigms for Application Practice
CRC Press 出版This book proposes practical application paradigms for deep neural networks, aiming to establish be
-
-
Wireless Sensor Network Security
Ingram 出版Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies
-
The Language of Machines
Ingram 出版This book offers a clear, accessible guide to the inner workings and real-world impact of large lan
-
Computer Network LAB
Networking refers to the practice of connecting computers and other devices to share resources, exc
-
Energy and Throughput Optimization in NB-IoT Networks
This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and
-
Self-Healing Networks and Resilient Architectures
This book explores the emerging paradigm of self-healing networks-digital infrastructures that can
-
IoT Security using VHDL
Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection ag
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Navigating the Digital Maze
Ingram 出版Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections b
-
Learning Kubernetes Security - Second Edition
Packt 出版Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implem
-
Navigating the Digital Maze
Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections b
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Prompting Made Simple
Rinity Media 出版UNLOCK THE POWER OF WORDS IN THE AGE OF AIYou don't need to code, you just need to know how to ask
-
Social First Brands
Kogan Page 出版How can you build a social media strategy that outlasts trends and delivers real impact? Social Fir
-
Social First Brands
Kogan Page 出版How can you build a social media strategy that outlasts trends and delivers real impact? Social Fir
-
-
Computers and Their Applications
Springer 出版This book constitutes the proceedings of the 40th International Conference on Computers and Their A
-
6gn for Future Wireless Networks
Springer 出版This volume set constitutes the proceedings of the 7th EAI International Conference on 6GN for Futu
-
Introduction to Modern Cryptography
CRC Press 出版Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides
-
High-Speed Large Capacity Optical Fiber Communications
Springer 出版This book systematically explores the synergistic integration of multidimensional modulation and co
-
-
The CISO 3.0
CRC Press 出版The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership.
-
Data and Applications Security and Privacy XXXIX
Springer 出版This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data a
-
Securing the Digital Frontier
Ingram 出版Cyber space is easily the most complex thing humans have ever created. With billions of people and
-
-
The Ciso 3.0
CRC Press 出版The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership.
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Practical Deep Learning, 2nd Edition
Deep learning made simple. Dip into deep learning without drowning in theory with this fully update
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Foundations and Practice of Security
Springer 出版This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Fou
-
Cyber Secrets
H+ Press 出版The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive technolo
-
Learning Web Design
O’Reilly Me 出版Do you want to build web pages but have no prior experience? This friendly guide is the perfect pla
-
-
The Ultimate ChatGPT Prompt Book
Discover the easiest way to leverage artificial intelligence with these 750+ ready-to-use ChatGPT p
-
Podcast Studies
Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in acade
-
Introduction to Cryptographic Definitions
Springer 出版Cryptographic definitions are often abstract and complex, making them challenging for beginners to
-
SEO That Gets You Seen
Kevluck 出版SEO That Gets You Seen is a field guide for business owners who are tired of being invisible online
-
Principle of Architecture, Protocol, and Algorithms for Cog-Min
Springer 出版The Internet is the most important global infrastructure in the digital economy era. Its role has s
-
Advanced Networking Technologies
Advanced networking methods and technologies are emerging as critical components in enabling novel
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat