-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
-
Innovations for Community Services
Springer 出版This book constitutes the refereed proceedings of the 25th International Conference on Innovations
-
Cyber Risk Management in Practice
CRC Press 出版Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-ch
-
-
-
Zero Trust in Resilient Cloud and Network Architectures
Cisco Press 出版Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineer
-
-
Learning Go with Networking
Ingram 出版DESCRIPTION Golang has emerged as a powerful language for networking, known for its efficiency and
-
-
-
Mastering Microsoft 365 Security Technologies
Ingram 出版DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving c
-
-
-
-
Where Matters
CRC Press 出版In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary
-
-
-
AI Powered Secure Software Engineering
In a world where financial systems are under constant threat, AI-Powered Secure Software Engineerin
-
Digital Forensics and Cyber Crime
Springer 出版The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the
-
Code-Based Cryptography
Springer 出版This book constitutes the refereed proceedings of the 12th International Conference on Code-Based C
-
LLM Design Patterns
Packt 出版Explore reusable design patterns, including data-centric approaches, model development, model fine-
-
-
-
Security and Privacy
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Security an
-
Leveraging Artificial Intelligence and Machine Learning
As cybersecurity threats continue to evolve in sophistication, velocity, and impact, the convention
-
Optimized Deep Learning for Network Intrusion Detection
This book targets young researchers exploring advanced network security techniques to counter evolv
-
Evaluation of Clustering Techniques for News Recommendation
The information overloading is one of the most significant issues nowadays. It can be seen in diffe
-
The Neural Network Revolution
This book provides a comprehensive exploration of deep learning, starting with the basics of neural
-
-
Lila and Andy learn about Artificial Intelligence
Are you curious about artificial intelligence? Discover how Large Language Models work with an AI b
-
-
-
Soft Computing and Its Engineering Applications
Springer 出版The two-volume proceedings set CCIS 2430-2431 constitutes the revised selected papers of the 6th In
-
Information Management and Big Data
Springer 出版This book constitutes the proceedings of the 11th Annual International Conference on Information Ma
-
-
AppSec Mastery
Fawzooz.AI 出版In an era where information is the cornerstone of any organization, securing it is paramount. "AppS
-
-
ICT Systems Security and Privacy Protection
Springer 出版The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP Intern
-
-
-
-
-
-
-
-
-
Would You Date Your Website?
Ingram 出版If your website were a person, what kind of impression would they make on a date?Most people have h