-
The Birth of Meme Coins
Ingram 出版Are you ready to dive into the fascinating world of meme coins? Before you invest a single dollar,
-
-
Enabling Microservice Success
Ingram 出版Microservices can be a very effective approach for delivering value to your organization and to you
-
-
Technological Innovation for Connected Cyber Physical Spaces
Springer 出版This book constitutes the refereed proceedings of the 14th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Practical Threat Detection Engineering
Packt 出版Go on a journey through the threat detection engineering lifecycle while enriching your skill set a
-
Software Supply Chain Security
Trillions of lines of code help us in our lives, companies, and organizations. But just a single so
-
The United States Government Internet Directory 2023
Ingram 出版The United States Government Internet Directory serves as a guide to the changing landscape of gove
-
How to Catch a Phish
Apress 出版Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybe
-
Artificial Intelligence, Real Profits
Ingram 出版Unlock the Power of AI: Revolutionize Your Marketing Strategy with "Artificial Intelligence, Real P
-
Cybersecurity for Decision Makers
CRC Press 出版This book is aimed at managerial decision-makers, practitioners in any field, and the academic comm
-
System Design Interview - An Insider's Guide
System Design Interview - An Insider's Guide (Volume 2) This book can be seen as a sequel to the b
-
Think Like a UX Researcher
Ingram 出版Think Like a UX Researcher will challenge your preconceptions about user experience (UX) research
-
Intelligent Analysis of Fundus Images
Ingram 出版This comprehensive compendium designs deep neural network models and systems for intelligent analys
-
How to Be a Web Developer
Apress 出版This complete beginner's guide is for anyone interested in becoming a web developer. Aimed at those
-
Advances in Cryptology - Crypto 2023
Springer 出版The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedin
-
Advances in Cryptology - Crypto 2023
Springer 出版The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedin
-
Research and Education in Urban History in the Age of Digital Libraries
Springer 出版This book constitutes refereed proceedings of the Third International Workshop on Research and Educ
-
Advances in Cryptology - Crypto 2023
Springer 出版The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedin
-
Introduction to Tensor Computing in Python
Ingram 出版Tensorised deep learning models compress large models using fewer parameters that are easier to exp
-
-
Understand, Manage, and Measure Cyber Risk
Apress 出版When it comes to managing cybersecurity in an organization, most tussle with basic foundational com
-
-
The Future of AI-Driven Crypto Investing
PN Books 出版Are you tired of using outdated trading strategies and feeling like you're always one step behind i
-
Detection of Intrusions and Malware, and Vulnerability Assessment
Springer 出版This book constitutes the proceedings of the 20th International Conference on Detection of Intrusio
-
Critical Information Infrastructures Security
Springer 出版This book constitutes the refereed proceedings of the 17th International Conference on Critical Inf
-
ChatGPT Prompts
Ingram 出版Unlock the full potential of ChatGPT and revolutionize your interactions!Have you heard about the i
-
Analysis, Cryptography and Information Science
Ingram 出版This compendium focuses on self-contained presentations of various developments in mathematical ana
-
The Psychology of Insider Risk
Ingram 出版Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psycholo
-
Chinese Next-Generation Psychological Warfare
Ingram 出版This report explores Chinese military thinking about next-generation psychological warfare, with a
-
The Psychology of Insider Risk
Ingram 出版Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psycholo
-
Svelte with Test-Driven Development
Packt 出版Build robust and performant applications by developing SvelteKit applications using automated testi
-
Cybersecurity for Entrepreneurs
Ingram 出版One data breach can close a small business before it even gets going. With all that is involved in
-
-
Ict Systems Security and Privacy Protection
Springer 出版This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on I
-
Technological Innovation for Digitalization and Virtualization
Springer 出版This book constitutes the refereed proceedings of the 13th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Python for Security and Networking - Third Edition
Packt 出版Gain a firm, practical understanding of securing your network and utilize Python's packages to dete
-
Cognitive Security
Springer 出版This book presents the latest research in cognitive security, a rapidly emerging field that address
-
Privacy and Identity Management
Springer 出版This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
AI for Finance
Ingram 出版Finance students and practitioners may ask: can machines learn everything? Could AI help me? Comput
-
Cyber Security, Cryptology, and Machine Learning
Springer 出版This book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security
-
Ai-Based Metaheuristics for Information Security and Digital Media
Ingram 出版This book examines the latest developments in Artificial Intelligence (AI)-based metaheuristics alg
-
Internet of Things Security
Ingram 出版Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT sys
-
Implementing Multifactor Authentication
Packt 出版Avoid MFA pitfalls-learn how to choose, implement, and troubleshoot MFA in your companyPurchase of
-
-
C++ Networking 101
Ingram 出版This book is an invaluable resource for aspiring network administrators aiming to deepen their unde
-
Building a Next-Gen SOC with IBM QRadar
Packt 出版Discover how different QRadar components fit together and explore its features and implementations
-
Identity-Native Infrastructure Access Management
Ingram 出版Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-pr