-
-
-
Automating Security Detection Engineering
Packt 出版Accelerate security detection development with AI-enabled technical solutions using threat-informed
-
High-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection
Ingram 出版High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents st
-
Mastering Open Source Threat Analysis Strategies
Ingram 出版The book is designed for a practical approach to learning, with examples based on scenarios. It cov
-
Cost Savvy Secure Cloud
Ingram 出版In "Cost Savvy Secure Cloud," author Preity Gupta challenges the misconception that security is sol
-
Practical Backscatter Communication for the Internet of Things
Springer 出版This book is devoted to offering a comprehensive and detailed discussion of the design of high-reli
-
-
-
-
Mastering PyTorch - Second Edition
Packt 出版Master advanced techniques and algorithms for machine learning with PyTorch using real-world exampl
-
Mastering Transformers - Second Edition
Packt 出版Explore transformer-based language models from BERT to GPT, delving into NLP and computer vision ta
-
-
-
Designing Real-World Multi-Domain Networks
Cisco Press 出版The comprehensive guide to design integration in a multi-domain environment providing consistent de
-
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 21st International Conference on Detection of Intrusio
-
Big Data and Security
Springer 出版The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big
-
-
Responsive Web Development
Ingram 出版Bridging web and mobile for next-gen user experiencesDESCRIPTION The book explores how modern web a
-
Adaptive Neuro-Fuzzy Inference System as a Universal Estimator
Ingram 出版This book presents some recent specialized works of a theoretical study in the domain of adaptive n
-
-
-
Mastering Gemini Artificial Intelligence Prompting for Google Workspace
Ingram 出版Explore the transformative capabilities of Gemini AI within Google Workspace in this essential guid
-
-
-
Learning Devsecops
Ingram 出版How can organizations integrate security while continuously deploying new features? How can some ma
-
-
-
-
Selected Areas in Cryptography
Springer 出版This book constitutes the refereed post-conference proceedings of the 29th International Conference
-
-
Encrypted Network Traffic Analysis
Springer 出版This book provides a detailed study on sources of encrypted network traffic, methods and techniques
-
-
-
-
-
-
-
Combatting Cyber Terrorism
Ingram 出版In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A
-
Network Automation with Nautobot
Packt 出版Transform the way your network teams think about and deploy enterprise network automation through t
-
Critical Infrastructure Security
Packt 出版Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infras
-
Information and Communications Technologies
Springer 出版This book constitutes the proceedings of the Second International Libyan Conference on Information
-
Post-Quantum Cryptography
Springer 出版The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th Int
-
Post-Quantum Cryptography
Springer 出版The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th Int
-
-
-