-
-
Selected Areas in Cryptography
Springer 出版This book constitutes the refereed post-conference proceedings of the 29th International Conference
-
-
Encrypted Network Traffic Analysis
Springer 出版This book provides a detailed study on sources of encrypted network traffic, methods and techniques
-
-
-
-
-
-
-
Combatting Cyber Terrorism
Ingram 出版In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A
-
Network Automation with Nautobot
Packt 出版Transform the way your network teams think about and deploy enterprise network automation through t
-
Critical Infrastructure Security
Packt 出版Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infras
-
Information and Communications Technologies
Springer 出版This book constitutes the proceedings of the Second International Libyan Conference on Information
-
Post-Quantum Cryptography
Springer 出版The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th Int
-
Post-Quantum Cryptography
Springer 出版The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th Int
-
-
-
-
-
Endpoint Detection and Response Essentials
Packt 出版Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts th
-
Insecure Digital Frontiers
Ingram 出版'Insecure Digital Frontiers' is an immersive exploration into the tumultuous realm of cybersecurity
-
Mastering WooCommerce - Second Edition
Packt 出版Elevate your e-commerce journey with this comprehensive guide covering installation, product setup,
-
-
-
-
Demystifying Large Language Models
Ingram 出版This book is a comprehensive guide aiming to demystify the world of transformers -- the architectur
-
Learning Subsequential Transducers. A Categorical Approach
Ingram 出版Master's Thesis from the year 2024 in the subject Computer Sciences - Artificial Intelligence, Univ
-
-
The Inevitable Ai
Ingram 出版Just like the discovery of fire catapulted humanity from cave dwellers to space explorers, AI promi
-
-
-
Homeland and territorial security with AI
Ingram 出版This book explores the innovative concept of a knowledge cartridge dedicated to internal and territ
-
Foundations and Practice of Security
Springer 出版This book constitutes the refereed proceedings of the 16th International Symposium on Foundations a
-
Storage Area Networks
Ingram 出版"Storage Area Networks: Design, Principles & Management" delves into the world of SAN technology, p
-
-
Penetration Testing with Kali NetHunter
Ingram 出版Fortify your mobile world: Discover cutting-edge techniques for mobile security testingDESC
-
Implementing Palo Alto Networks Prisma(R) Access
Packt 出版Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced
-
Spring Security in Action, Second Edition
Don't let security be an afterthought. Spring Security in Action, Second Edition is your vital comp
-
-
Risks and Security of Internet and Systems
Springer 出版This book constitutes the revised selected papers of the 18th International Conference on Risks and
-
Mastering NLP from Foundations to LLMs
Packt 出版Enhance your NLP proficiency with modern frameworks like LangChain, explore mathematical foundation
-
IT Troubleshooting Skills Training
Ingram 出版���� Welcome to the ultimate resource for mastering IT troubleshooting
-
-
-
-
Ultimate Penetration Testing with Nmap
Ingram 出版Master one of the most essential tools a professional pen tester needs to know.Book DescriptionThis
-
Modern API Design with gRPC
Ingram 出版Elevate Your Development with Effortless and Efficient API Communication.Book Description"Modern AP