-
Trust in Computer Systems and the Cloud
Wiley 出版Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecu
-
Book of Anonymity
Ingram 出版Anonymity is highly contested, marking the limits of civil liberties and legality. Digital technolo
-
Network Architecture with Recursive Addressing
Ingram 出版A network architecture, named NARA, based on recursive addressing is proposed. The Internet is mode
-
Applied Natural Language Processing in the Enterprise
Ingram 出版NLP has exploded in popularity over the last few years. But while Google, Facebook, OpenAI, and oth
-
Modern Cryptography for Cybersecurity Professionals
Packt 出版As a cybersecurity professional, discover how to implement cryptographic techniques to help your or
-
Topics in Cryptology - Ct-Rsa 2021
Springer 出版This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2
-
Video Marketing Rules
Ingram 出版Video Marketing Rules shows entrepreneurs and business owners how to take advantage of the Online V
-
The Subcritical Brain
Ingram 出版Have over a hundred years of brain research revealed all its secrets? This book is motivated by a r
-
Jumpstart Jamstack Development
Packt 出版Leverage Jamstack principles, techniques, and best practices to build dynamic websites and web apps
-
Instagram Marketing Step-By-Step
Ingram 出版Are you looking to grow your branding through social media powerhouses like Instagram? Would you li
-
Mathematical Modeling and Supercomputer Technologies
Springer 出版This book constitutes selected and revised papers from the 20th International Conference on Mathema
-
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of
-
Public-Key Cryptography - Pkc 2021
Springer 出版The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR In
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th
-
-
Zscaler Cloud Security Essentials
Packt 出版Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provid
-
Cisco Certified CyberOps Associate 200-201 Certification Guide
Packt 出版Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associa
-
Applied Cryptography and Network Security
Springer 出版The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Confere
-
Deep Learning and Linguistic Representation
Ingram 出版The application of deep learning methods to problems in natural language processing has generated s
-
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Springer 出版There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first compo
-
Technological Innovation for Applied AI Systems
Springer 出版This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Silicon Valley Cybersecurity Conference
Springer 出版This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Confe
-
Campus Network Architectures and Technologies
Ingram 出版The book will provide readers with a comprehensive understanding of next-generation campus network
-
-
Secure Searchable Encryption and Data Management
Ingram 出版This book provides every necessary detail required to develop the secure searchable encryption sche
-
Internet of Things
Ingram 出版Internet of things (IoT) is the connection and communication of physical objects (smart devices) ov
-
The Digital Frontier
Ingram 出版The global web and its digital ecosystem can be seen as tools of emancipation, communication, and s
-
The Digital Frontier
Ingram 出版The global web and its digital ecosystem can be seen as tools of emancipation, communication, and s
-
The Cybersecurity Manager's Guide
Ingram 出版If you're a cybersecurity professional, then you know how it often seems that no one cares about (o
-
Beginning Ruby 3
Apress 出版Learn the principles behind object-oriented programming in Ruby and within a few chapters create a
-
-
連結之戰:網路、經濟、移民如何成為武器
行人文化 出版COVID-19引爆無聲的砲火,國界的高牆再度矗立 本書榮獲《金融時報》年度最佳經濟學書籍 馬克?里歐納德繼《歐洲如何打造21世紀》、《中國怎麼想? 》最新力作 二?二一年下半年,一群
-
-
Ruby Cat Farm
Blurb 出版This is a friendly walkthrough that'll help you build your first web application using a powerful,
-
Preparing for Digital Disruption
Springer 出版This open access book offers an analysis of why preparations for digital disruption should become a
-
Vue.js 3 By Example
Packt 出版Kick-start your Vue.js development career by learning the fundamentals of Vue 3 and its integration
-
Blockchain, Artificial Intelligence, and the Internet of Things
Springer 出版This book provides basic concepts and deep knowledge about various security mechanisms that can be
-
Python Natural Language Processing Cookbook
Packt 出版Get to grips with solving real-world NLP problems, such as dependency parsing, information extracti
-
Scam Proof Your Life in the End Times
Ingram 出版Scams come in all sizes. Some are schoolyard scams by teenage bullies. Others are hedge-fund sized
-
Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture
Ingram 出版Many small and medium scale businesses cannot afford to procure expensive cybersecurity too
-
Infosec Strategies and Best Practices
Packt 出版Advance your career as an information security professional by turning theory into robust solutions
-
【電子書】武統台灣:最後結局
武安工作室 出版武統台灣?在巨變發生前,期先做好準備,事先做好防範,預先做好籌畫,早先做好演練! ◎福爾摩沙、婆娑之島、美麗之島,即將要發生什麼地動山搖的驚天劇變? ◎為什麼解放軍一定要登陸台灣島?且
-
嚴家祺回憶錄:命運交響樂
太山 出版不可選擇謂之「命」,不可控制謂之「運」 這本書以從毛澤東以來的中國政治史為背景,記錄了嚴家祺、高皋在中國、「六四」後經過大亞灣荒島,出走中國,改變命運,以及在法國、美國的生活。 作者
-
Electronics and Communications Engineering
Ingram 出版Every day, millions of people are unaware of the amazing processes that take place when using their
-
Mobile, Wireless and Sensor Networks
Ingram 出版Wireless networking covers a variety of topics involving many challenges. The main concern of clust
-
Mobile Information Service for Networks
Springer 出版This book introduces readers to mobile information services for networks. The content is divided in
-
Digital Robbery
Springer 出版The insecure nature of cyberspace.- Why rob banks? That's where the money is......even online!.- Th