-
Cybersecurity
Springer 出版This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conferenc
-
Online Hate Speech
Springer 出版This book informs readers on how to understand, detect, and mitigate hate speech in online social m
-
Considerate Content
Lulu.com 出版Rebekah Barry draws on her experience of doing research with people with wide-ranging needs, showin
-
ISO/IEC 27001 meets the NIS2 EU Directive - A Practical Guide to Achieving Conformity
Lulu.com 出版A structured, erudite, and practical guide for aligning ISO/IEC 27001:2022 with the legal obligatio
-
ISO/IEC 27001 Meets the SOX 404 Risk Assessment - A Cross-Domain Risk Reference
Lulu.com 出版A practical reference for bridging ISO/IEC 27001 and SOX 404. This book offers a clear, structured
-
Reengineering Cyber Security Process
de Gruyter 出版In today's rapidly evolving information technology landscape, cyber-attacks on company assets and I
-
Modern Communication with Social Media
This book explores the evolution of communication, communication media, and covers social media in
-
Advances in the Internet of Things
CRC Press 出版Many reports estimate that in 2024, the number of IoT devices exceeded 18 billion worldwide, with p
-
An Essay On The Art Of Decyphering
An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breakin
-
An Essay On The Art Of Decyphering
An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breakin
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
-
Natural Language Processing and Information Retrieval
CRC Press 出版This book presents the basics and recent advancements in natural language processing and informatio
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Mastering Network Flow Traffic Analysis
DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, gi
-
JavaScript for Kids
Welcome to the book "JavaScript for Kids: Start your Coding Adventure". This book is your introduct
-
Cyber Security for Next-Generation Computing Technologies
CRC Press 出版This book sheds light on the cybersecurity challenges associated with next generation computing tec
-
AI for Everyday It
Automate and accelerate your everyday IT tasks with instant solutions! What if you never had to wri
-
Responsive Design
Welcome to the book "Responsive Design". In this book, I'll introduce you to all the CSS functions
-
Angular Observables and Promises
Welcome to the book "Angular Observables and Promises: A Practical Guide to Asynchronous Programmin
-
Malware Narratives
Opentask 出版Software Narratology, the science of software stories, found its successful application in software
-
Cyber Risk Management in Practice
CRC Press 出版Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-ch
-
Information Security Governance Using Artificial Intelligence of Things in Smart Environments
CRC Press 出版The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT)
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
-
Innovations for Community Services
Springer 出版This book constitutes the refereed proceedings of the 25th International Conference on Innovations
-
Cyber Risk Management in Practice
CRC Press 出版Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-ch
-
Mastering Deepfake Technology
This book offers a comprehensive exploration of the profound challenges and opportunities presented
-
-
Zero Trust in Resilient Cloud and Network Architectures
Cisco Press 出版Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineer
-
-
Learning Go with Networking
Ingram 出版DESCRIPTION Golang has emerged as a powerful language for networking, known for its efficiency and
-
Cyber Security Kill Chain - Tactics and Strategies
Packt 出版Understand the cyber kill chain framework and discover essential tactics and strategies to effectiv
-
Mastering Palo Alto Networks - Third Edition
Packt 出版Unlock the full potential of Palo Alto Networks firewalls with expert insights and hands-on strateg
-
Mastering Microsoft 365 Security Technologies
Ingram 出版DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving c
-
Redefining Information Security
Kogan Page 出版Is your security strategy keeping pace with innovation and business growth? Redefining Information
-
A Simple Guide to Retrieval Augmented Generation
Everything you need to know about Retrieval Augmented Generation in one human-friendly guide. Augme
-
-
Where Matters
CRC Press 出版In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary
-
Where Matters
CRC Press 出版In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary
-
-
AI Powered Secure Software Engineering
In a world where financial systems are under constant threat, AI-Powered Secure Software Engineerin
-
Digital Forensics and Cyber Crime
Springer 出版The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the
-
Code-Based Cryptography
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Code-Based C
-
LLM Design Patterns
Packt 出版Explore reusable design patterns, including data-centric approaches, model development, model fine-
-
Digital Forensics and Cyber Crime
Springer 出版The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the