-
Computer Security for ASSIST
This thesis examines the multilevel security problem of simultaneous processing of compartmented an
-
Cybermad
"Cyberspace has grown in importance to the United States (US), as well as the rest of the word. As
-
Progress in Cryptology - Africacrypt 2025
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Cryptology i
-
Models, Metaphors, and Intuition
My goal in this writing is to promote social consciousness and increase awareness and understanding
-
Emerging Patterns in Cybersecurity
In a digital era where cyber threats are evolving faster than ever, understanding the complexities
-
Moderator-topics
"Moderator-topics, Volume 16" delves into the crucial aspects of online community management and co
-
Hacking Tricks, Methods, and Offensive Strategies
Understanding how systems are secured and how they can be breached is critical for robust cybersecu
-
How Large Language Models Work
Learn how large language models like GPT and Gemini work under the hood in plain English. How Large
-
-
The New Generative AI with LangChain Playbook
Publishdrive 出版STOP Building Fragile AI Prototypes That Break in Production While your competitors struggle with b
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Next Generation Data Science and Blockchain Technology for Industry 5.0
A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widesp
-
Public Relations in the Digital Age
This book explores the evolving landscape of PR in an era shaped by social media, instant communica
-
Wireless Communication and Remote Control in Drone Delivery Networks
Delivery drones, also known as unmanned aerial vehicles (UAVs), are revolutionizing the logistics a
-
Agentic AI and the Future of Work
Ingram 出版'As AI continues to evolve, one of the most talked-about and impactful advancements across industri
-
Information Security
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security Education
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Learning API Styles
An application programming interface (API) enables data exchange in systems such as web application
-
Cyber Security Education
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Advancements In Smart Card And Biometric Technology
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Cyber Forensics and Digital Security
In today's hyperconnected world, where digital transformation accelerates at an unprecedented pace,
-
Practical Cloud Security Handbook
As organizations rapidly migrate to cloud environments, robust cloud security is no longer optional
-
The Collaborative Coder
The digital revolution has redefined the boundaries of software development, transforming it into a
-
Llmops
Here's the thing about large language models: they don't play by the old rules. Traditional MLOps c
-
Information Security and Privacy
Springer 出版This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confere
-
Establishing Security Operations Center
Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Artificial Intelligence in Image Processing
Artificial Intelligence in Image Processing: Concepts, Techniques, and Applications provides a comp
-
Certified Ethical Hacker (Ceh) Study Guide
The CEH exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing ex
-
Military Operations in Cyberspace
In the book cyberspace capabilities, threats, and attacks are described. The principles of the cybe
-
Computer Networks
The book computer Networks provides a comprehensive introduction to the concepts and principles of
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel