-
Mastering LLM Applications with LangChain and Hugging Face
Ingram 出版DESCRIPTION The book is all about the basics of NLP, generative AI, and their specific component LL
-
The Content to Cash Bible
Ingram 出版In today's digital world, content is king-but cash is the crown. "The Content to Cash Bible" is you
-
The Content to Cash Bible
Ingram 出版In today's digital world, content is king-but cash is the crown. "The Content to Cash Bible" is you
-
-
Cybersecurity in Italy
Springer 出版This book presents a detailed and innovative analysis of the governance, policies and ecosystem tha
-
Inside Cyber Warfare
Ingram 出版Get a fascinating and disturbing look into how state and nonstate actors throughout the world use c
-
The Language of Cyber Attacks
Bloomsbury 出版Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with
-
Offensive Security Using Python
Packt 出版Unlock Python's hacking potential and discover the art of exploiting vulnerabilities in the world o
-
IDS and IPS with Snort 3
Packt 出版Learn the essentials of Snort 3.0, including installation, configuration, system architecture, and
-
AWS Security Cookbook - Second Edition
Packt 出版Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and
-
Secure Health
Ingram 出版"Secure Health confronts these challenges head-on, offering a comprehensive exploration of the late
-
Sustainable Web Design
Ingram 出版The internet may be digital, but it carries a very physical cost. From image files to colors to cod
-
-
Crafting Secure Software
Packt 出版Gain a solid understanding of the threat landscape and discover best practices to protect your soft
-
Advances in Cyber Security and Intelligent Analytics
Ingram 出版The book highlights the challenges faced by emerging paradigms and presents the recent developments
-
Privacy-preserving and Untraceable Group Data Sharing Scheme in Cloud
Ingram 出版With the development of cloud computing, the great amount of storage data requires safe and efficie
-
Big Data Analytics in Fog-Enabled IoT Networks
Ingram 出版This book emphasizes and facilitate a greater understanding of various security and privacy approac
-
An Interdisciplinary Approach to Modern Network Security
Ingram 出版An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and tren
-
Energy Optimization Protocol Design for Sensor Networks in IoT Domains
Ingram 出版This book provides an essential overview of IoT, energy-efficient topology control protocols, motiv
-
Authorization and Access Control
Ingram 出版This book focuses on various authorization and access control techniques, threats and attack modell
-
Occupy the Cyberspace
Ingram 出版The central idea is 'the future.' The analysis reveals the fact that uncertainty shall never be an
-
Cybersecurity Issues in Emerging Technologies
Ingram 出版The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing att
-
A Brief History of Cyberspace
Ingram 出版With the Internet, a new space, cyberspace, has formed, been rapidly integrated into daily life, an
-
Urban Analytics with Social Media Data
Ingram 出版The use of data science and urban analytics has become a defining feature of smart cities. This tim
-
Security and Privacy Trends in Cloud Computing and Big Data
Ingram 出版It is essential for an organization to know before involving themselves in cloud computing and big
-
Securing Social Networks in Cyberspace
Ingram 出版This book collates the key security and privacy concerns faced by individuals and organizations who
-
Search Engine Optimization and Marketing
Ingram 出版Search Engine Optimization and Marketing: A Recipe for Success in Digital Marketing analyzes the we
-
5G Cyber Risks and Mitigation
Ingram 出版5G technology is the next step in the evolution of wireless communication. However, it also introdu
-
Cyber Security and Operations Management for Industry 4.0
Ingram 出版Covering cyber security and Industry 4.0 concepts from a management and operational level, this boo
-
Modeling the Power Consumption and Energy Efficiency of Telecommunications Networks
Ingram 出版This book introduces the technical foundations and tools for estimating the power consumption of in
-
Privacy and Security Challenges in Cloud Computing
Ingram 出版The text provides readers with an overview of cloud computing, beginning with historical perspectiv
-
Secure Edge Computing
Ingram 出版The internet is making our daily life as digital as possible and this new era is called the Interne
-
Security Awareness Design in the New Normal Age
Ingram 出版This book will primarily consider the problem of hitting that 'Sweet Spot' in the age of 'New Norma
-
Entropy Randomization in Machine Learning
Ingram 出版Entropy Randomization in Machine Learning presents a new approach to machine learning--entropy rand
-
Idiomatic Rust
Ingram 出版Tips, tricks, design patterns, and secret features of Rust that will help you build stable and main
-
Recent Trends in Blockchain for Information Systems Security and Privacy
Ingram 出版The main goal of this book is to encourage both researchers and practitioners of Blockchain technol
-
Designing Secure Systems
Ingram 出版Modern systems are an intertwined mesh of human process, physical security, and technology. Attacke
-
Building AI Applications with OpenAI APIs - Second Edition
Packt 出版Improve your app development skills by building a ChatGPT clone, code bug fixer, quiz generator, tr
-
Opportunistic Networks
Ingram 出版This book provides theoretical, algorithmic, simulation, and implementation-based research developm
-
Securing Iot and Big Data
Ingram 出版This book covers IoT and Big Data from a technical and business point of view. The book explains th
-
Internet of Medical Things
Ingram 出版Internet of Things (IoT) has become a valuable tool for connection and information exchange between
-
The Internet of Mechanical Things
Ingram 出版This book provides knowledge, skills, and strategies an engineer requires to effectively integrate
-
Industrial Internet of Things Security
Ingram 出版The industrial landscape and global society are changing rapidly, driven by the growing adoption of
-
Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints
Ingram 出版It presents research developments and novel methodologies for recursive filtering for 2-D shift-var
-
The Convergence of Internet of Things and Cloud for Smart Computing
Ingram 出版This book presents the know-how of the real-time IoT application development activity including a b
-
Evidence-Based Cybersecurity
Ingram 出版The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a
-
Secure Data Management for Online Learning Applications
Ingram 出版This book talks about the theoretical frameworks, technical methodologies, Information security, an
-
Cyber-Security Threats, Actors, and Dynamic Mitigation
Ingram 出版Cyber-security and its related threats change constantly. The book aims at using practical contempo