-
1949年以來中國在西方的形象
香港中和 出版作者以時間為經、以話題為緯呈現了1949年以來西方對中國政治、經濟、外交、社會、文化以及環境保護等方面的看法和認識。從不同媒體展示代表不同聲音、有?不同表現形式的觀點和看法, 在此基礎上作者分析
-
Alice and Bob Learn Secure Coding
Wiley 出版Unlock the power of secure coding with this straightforward and approachable guide! Discover a game
-
Advances in Artificial Intelligence
Springer 出版This book constitutes the refereed proceedings of the 20th Conference of the Spanish Association fo
-
-
Disruptive Networking
The references provided cover a wide range of topics in modern computing and networking, including
-
”Network Nexus
"Networking Essentials" offers a comprehensive exploration of modern networking technologies, provi
-
Bridging the Digital Gap
"Bridging the Digital Gap: Exploring the Role of Artificial Intelligence, Machine Learning, and Cyb
-
Cybersecurity and Information Assurance
Cybersecurity and Information Assurance is a comprehensive book that explores the world of cybersec
-
Ubiquitous Networking
Springer 出版This book constitutes the refereed proceedings of the 9th International Symposium on Ubiquitous Net
-
Red Team, Blue Team (Hardcover Edition)
"Red Team, Blue Team: A White Hacking Reference" is a comprehensive guide that takes readers on a j
-
AI Ethics and Fairness
Get ready to dive deep into the ethical complexities of AI with AI Ethics and Fairness by Edward Fr
-
The Code of Honor
Wiley 出版A comprehensive and practical framework for ethical practices in contemporary cybersecurity While s
-
Hacking for the Technically Challenged
Get ready for a wild ride with "Hacking for the Technically Challenged: A Noob's Guide" by Black Ha
-
Internet of Things - New Insights
Intechopen 出版Embark on a journey through the dynamic world of the Internet of Things (IoT) with Internet of Thin
-
Computational Semantics
Intechopen 出版This book analyzes the application of computer science and artificial intelligence (AI) techniques
-
Brain hacking without fanaticism
The work is devoted to the study of the issue of Internet technologies of the XXI century, as well
-
Instagram and the construction of identity among Argentine teenagers
This qualitative research work had a design based on grounded theory, non-experimental, cross-secti
-
Data Migration for SAP
SAP Press 出版Whether you're moving to the cloud, migrating to SAP S/4HANA, or replacing a legacy system, get the
-
Full-Duplex Radio in High-Efficiency WLANs
The Full-Duplex radio transmission technique is a prominent feature in the physical layer of the ne
-
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide
Ingram 出版CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information S
-
Architecting Salesforce Success
Packt 出版Accelerate your career by understanding what it takes to grow within the Salesforce ecosystemKey Fe
-
Secured Routing Approach
A advanced Routing algorithm for Wireless sensor network, this approach is efficient method for WSN
-
Security Yearbook 2024
Wiley 出版A fascinating history of the cybersecurity industry as well as an up-to-date collection of leading
-
The Cybersecurity Guide to Governance, Risk, and Compliance
Wiley 出版The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generat
-
Exam Ref Az-500 Microsoft Azure Security Technologies
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure secu
-
Npr's Podcast Start Up Guide
Ingram 出版From NPR comes the definitive guide to podcasting--featuring step-by-step advice on how to find a u
-
Multi-User Access in High-Efficiency WLANs
To promote the MU (Multi-User) communications in High-Efficiency WLANs, the new IEEE 802.11ax stand
-
【電子書】巴菲特的對帳單 卷三
感電 出版什麼樣的企業可以獲得巴菲特的「信任」? 什麼樣的企業內在價值被低估,其實是能創造複利的金雞母? 看巴菲特如何善用「信任邊際」,複製成功的投資案例 老是錯估標的的內在價值,更抓不準什麼時間該進場。
-
-
Understanding Cryptography
Springer 出版Understanding and employing cryptography has become central for securing virtually any digital appl
-
Introduction to IoT, Blockchain, and Healthcare
The convergence of Internet of Things (IoT) and Blockchain technologies has paved the way for trans
-
Foundations of IoT in Healthcare
The integration of Internet of Things (IoT) technology in healthcare has led to transformative chan
-
Web Development Career Master Plan
Packt 出版Gain a comprehensive understanding of web development, from foundational technologies to advanced t
-
【電子書】The Rule of Law:A Comparative Perspective—Festschrift for Anton MJ COORAY on the Occasion of his Sixty–fifth Birthday
城市大學 出版At the end of June 2013, Professor Anton MJ COORAY retired from his position at the City Universi
-
Slow Internet
Ingram 出版This brief book - designed to be readable even for people who've had their attention span shattered
-
The Dark Side of Networking
Ingram 出版Master the art of network security with this comprehensive guide. Dive deep into understanding netw
-
IoT-Blockchain Applications in Patient Care
The integration of Internet of Things (IoT) and Blockchain technologies has shown promising potenti
-
Fundamentals of Machine Learning Algorithms
In machine learning, models and algorithms can learn from data and make predictions or judgments wi
-
Blockchain in Healthcare
Blockchain technology has emerged as a promising solution for addressing data security and interope
-
Cloud computing service adoption & supply chain performance
This research book empirically investigated the influence of cloud computing service adoption on su
-
New Age Master Data Management in Synergy with Big Data Analytics
In this digital transformation era, data is growing exponentially due to substantial online transac
-
Future Trends and Innovations in Healthcare
The landscape of healthcare is undergoing rapid transformation driven by technological advancements
-
ChatGPT Riches
Are you ready to unlock the gateway to unprecedented success? Wondering how some white & black folk
-
Architecting Fog-Cloud Networks
"Fog-Cloud Networks: Bridging the Gap Between Edge and Cloud Computing" offers a comprehensive expl
-
Artificial Intelligence
Artificial Intelligence (AI) and algorithms have become a fixture in our lives. Many organizations
-
Smart Healthcare Systems and its Applications
The landscape of healthcare is rapidly evolving with the integration of smart technologies, data an
-
Storage Privacy via Black Box and Sanitizable Signature
It is a general term that can be utilized in any case the shape the information may take Informatio
-
Blockchain Integration in IoT-based Smart Healthcare Systems
Blockchain technology has gained significant attention in recent years due to its potential to revo