-
Learning Web Design
O’Reilly Me 出版Do you want to build web pages but have no prior experience? This friendly guide is the perfect pla
-
Introduction to Cryptographic Definitions
Springer 出版Cryptographic definitions are often abstract and complex, making them challenging for beginners to
-
The Ultimate ChatGPT Prompt Book
Discover the easiest way to leverage artificial intelligence with these 750+ ready-to-use ChatGPT p
-
Podcast Studies
Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in acade
-
SEO That Gets You Seen
Kevluck 出版SEO That Gets You Seen is a field guide for business owners who are tired of being invisible online
-
Principle of Architecture, Protocol, and Algorithms for Cog-Min
Springer 出版The Internet is the most important global infrastructure in the digital economy era. Its role has s
-
Advanced Networking Technologies
Advanced networking methods and technologies are emerging as critical components in enabling novel
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Healing with Artificial Intelligence
CRC Press 出版Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applicat
-
Cybersecurity
Springer 出版This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conferenc
-
Online Hate Speech
Springer 出版This book informs readers on how to understand, detect, and mitigate hate speech in online social m
-
Considerate Content
Lulu.com 出版Rebekah Barry draws on her experience of doing research with people with wide-ranging needs, showin
-
ISO/IEC 27001 meets the NIS2 EU Directive - A Practical Guide to Achieving Conformity
Lulu.com 出版A structured, erudite, and practical guide for aligning ISO/IEC 27001:2022 with the legal obligatio
-
ISO/IEC 27001 Meets the SOX 404 Risk Assessment - A Cross-Domain Risk Reference
Lulu.com 出版A practical reference for bridging ISO/IEC 27001 and SOX 404. This book offers a clear, structured
-
Reengineering Cyber Security Process
de Gruyter 出版In today's rapidly evolving information technology landscape, cyber-attacks on company assets and I
-
Modern Communication with Social Media
This book explores the evolution of communication, communication media, and covers social media in
-
Advances in the Internet of Things
CRC Press 出版Many reports estimate that in 2024, the number of IoT devices exceeded 18 billion worldwide, with p
-
An Essay On The Art Of Decyphering
An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breakin
-
An Essay On The Art Of Decyphering
An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breakin
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
-
Natural Language Processing and Information Retrieval
CRC Press 出版This book presents the basics and recent advancements in natural language processing and informatio
-
Mastering Network Flow Traffic Analysis
DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, gi
-
JavaScript for Kids
Welcome to the book "JavaScript for Kids: Start your Coding Adventure". This book is your introduct
-
Cyber Security for Next-Generation Computing Technologies
CRC Press 出版This book sheds light on the cybersecurity challenges associated with next generation computing tec
-
AI for Everyday It
Automate and accelerate your everyday IT tasks with instant solutions! What if you never had to wri
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Responsive Design
Welcome to the book "Responsive Design". In this book, I'll introduce you to all the CSS functions
-
Angular Observables and Promises
Welcome to the book "Angular Observables and Promises: A Practical Guide to Asynchronous Programmin
-
Malware Narratives
Opentask 出版Software Narratology, the science of software stories, found its successful application in software
-
Cyber Risk Management in Practice
CRC Press 出版Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-ch
-
Information Security Governance Using Artificial Intelligence of Things in Smart Environments
CRC Press 出版The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT)
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Innovations for Community Services
Springer 出版This book constitutes the refereed proceedings of the 25th International Conference on Innovations
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Human-Computer Interaction
Springer 出版This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction themat
-
Mastering Deepfake Technology
This book offers a comprehensive exploration of the profound challenges and opportunities presented
-
-
Cyber Risk Management in Practice
CRC Press 出版Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-ch
-
Zero Trust in Resilient Cloud and Network Architectures
Cisco Press 出版Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineer
-
-
Learning Go with Networking
Ingram 出版DESCRIPTION Golang has emerged as a powerful language for networking, known for its efficiency and
-
Cyber Security Kill Chain - Tactics and Strategies
Packt 出版Understand the cyber kill chain framework and discover essential tactics and strategies to effectiv
-
Mastering Palo Alto Networks - Third Edition
Packt 出版Unlock the full potential of Palo Alto Networks firewalls with expert insights and hands-on strateg
-
Mastering Microsoft 365 Security Technologies
Ingram 出版DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving c
-
Redefining Information Security
Kogan Page 出版Is your security strategy keeping pace with innovation and business growth? Redefining Information
-
A Simple Guide to Retrieval Augmented Generation
Everything you need to know about Retrieval Augmented Generation in one human-friendly guide. Gener
-