-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping in
-
Learning Serverless Security
Despite the increased adoption of serverless computing services around the world, a big gap still e
-
Privacy and Security for Large Language Models
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use
-
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping in
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully review
-
-
The vCISO Playbook
The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Bu
-
The Future of Hacking
In a world, where cyber threats evolve daily, the line between hacker and hero is thinner than you
-
You Have a New Memory
NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural critici
-
Artificial Intelligence Paradigms for Application Practice
CRC Press 出版This book proposes practical application paradigms for deep neural networks, aiming to establish be
-
-
Wireless Sensor Network Security
Ingram 出版Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies
-
The Language of Machines
Ingram 出版This book offers a clear, accessible guide to the inner workings and real-world impact of large lan
-
Computer Network LAB
Networking refers to the practice of connecting computers and other devices to share resources, exc
-
Energy and Throughput Optimization in NB-IoT Networks
This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and
-
Self-Healing Networks and Resilient Architectures
This book explores the emerging paradigm of self-healing networks-digital infrastructures that can
-
IoT Security using VHDL
Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection ag
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Navigating the Digital Maze
Ingram 出版Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections b
-
Learning Kubernetes Security - Second Edition
Packt 出版Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implem
-
Navigating the Digital Maze
Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections b
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Computational Science and Its Applications - Iccsa 2025
Springer 出版The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th Int
-
Social First Brands
Kogan Page 出版How can you build a social media strategy that outlasts trends and delivers real impact? Social Fir
-
Social First Brands
Kogan Page 出版How can you build a social media strategy that outlasts trends and delivers real impact? Social Fir
-
-
Prompting Made Simple
Rinity Media 出版UNLOCK THE POWER OF WORDS IN THE AGE OF AIYou don't need to code, you just need to know how to ask
-
Computers and Their Applications
Springer 出版This book constitutes the proceedings of the 40th International Conference on Computers and Their A
-
6gn for Future Wireless Networks
Springer 出版This volume set constitutes the proceedings of the 7th EAI International Conference on 6GN for Futu
-
Introduction to Modern Cryptography
CRC Press 出版Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides
-
High-Speed Large Capacity Optical Fiber Communications
Springer 出版This book systematically explores the synergistic integration of multidimensional modulation and co
-
-
The CISO 3.0
CRC Press 出版The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership.
-
Data and Applications Security and Privacy XXXIX
Springer 出版This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data a
-
Securing the Digital Frontier
Ingram 出版Cyber space is easily the most complex thing humans have ever created. With billions of people and
-
-
The Ciso 3.0
CRC Press 出版The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership.
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Practical Deep Learning, 2nd Edition
Deep learning made simple. Dip into deep learning without drowning in theory with this fully update
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Applied Cryptography and Network Security
Springer 出版This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Confer
-
Foundations and Practice of Security
Springer 出版This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Fou
-
Cyber Secrets
H+ Press 出版The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive technolo
-