-
Data Dynamo
"Data Dynamo: Navigating India's Digital Infrastructure" offers a comprehensive exploration of the
-
React in Depth
A guide to the advanced React skills used by the very best React developers. React in Depth teaches
-
Generative Artificial intelligence
Generative Artificial Intelligence (AI) stands at the forefront of innovation, transforming the lan
-
Online Identity - An Essential Guide
Ingram 出版In today's digital age, having a strong online identity has become more important than ever. This b
-
Popup Your E-commerce Business - Entrepreneur 10 Secret Guides to Success Online & Offline
Ecommerce Marketing Book for Popupreneurs.Pop-up Your E-commerce is a must-read business literature
-
兩岸關係的機遇與挑戰:初版
五南 出版兩岸關係發展史無前例、錯綜複雜、瞬時萬變、虛實交錯,充滿各種機遇與挑戰。如何精準掌握兩岸關係發展的現況與趨勢,既牽涉到兩岸的和平與發展,也牽涉到亞太地區的穩定繁榮與戰略布局。 本書匯聚藍綠
-
Comptia Security+ Sy0-701 Cert Guide
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from P
-
搶登釣魚台:歷史見證
博客思 出版搶登釣魚台的一爪鴻泥釣魚台這一蕞爾小島,因豐富的海底蘊藏與戰略地位,成為國際強權鬥爭的角力場;加上中、日間的歷史情結,爭端由「油」轉「氣」,儼然已成為「東亞火藥庫」。釣魚台紛爭是一段錯綜複雜的歷史,
-
Fog-Cloud Computing
Fog-cloud computing represents a paradigm shift in distributed computing, offering a novel approach
-
The Comprehensive Guide to Cybersecurity Hiring
This comprehensive guide provides professionals, hiring managers, and business leaders with essenti
-
The Comprehensive Guide to Cybersecurity Careers
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and establ
-
走不出門的國家:英九的台灣
目前有4人說過讚前衛 出版本書是邱教授在台灣現代政論史上所留下來不朽的重要足跡-彭明敏 2008年馬政府上任以來,無能治國,上至國家主權,下至民生經濟,只能用失魂落魄四個字來形容,外交休兵還沾沾自喜,而大幅度地傾中,更是台灣
-
ChatGPT Riches
Are you ready to unlock the gateway to unprecedented success? Wondering how some white & black folk
-
Securing the Cloud
"Securing the Cloud: Fortifying Digital Skies" is a comprehensive guide that delves into the intric
-
臺灣政治發展史(1895年迄今)
幼獅文化 出版本書以客觀的歷史高度,深入剖析臺灣百年來的政治發展。從日本殖民臺灣51年的統治下,曾引發的抗爭,以及皇民化效應;臺灣光復初期的228事件與土地改革等措施,對臺獨運動與臺灣經濟發展的影響;1949年的
-
Performance Analysis and Improvement of the Fiber Optic Network
In contrast to coaxial cables, fiber optic cables are used in Local Area Networks are more difficul
-
Whispers in the Mist
"Whispers in the Mist: Unraveling the Secrets of Mist Computing" is a comprehensive exploration of
-
Mastering Ethical Hacking
"Mastering Ethical Hacking: A Comprehensive Guide to Network Security and Cyber Defense" is an esse
-
台灣選舉與民主化調查(TEDS)方法論之回顧與前瞻初版
五南 出版「台灣選舉與民主化調查」(Taiwan’s Election and Democracy Study,簡稱TEDS)大型跨校合作計畫自2000年啟動迄今已逾一個干支,本書旨在針對TE
-
中國外交戰略:傳統及其變遷-初版
五南 出版在觀察當前中國崛起之未來可能發展,並嘗試分析預測其未來走向時,相較於多數研究聚焦於中共建政以來之政策歷程,或改革開放與後冷戰時期以來之國內外環境變遷等,本書則企圖回溯過去兩千年來之更漫長的中國歷
-
-
-
Advanced Encryption Standard Improvement for Internet of Things
One of the most important communication technologies of our day is the Internet of Things. The IoT
-
Building Microservices with Node.js
Packt 出版Venture into microservices with Node.js, uncovering step-by-step roadmaps, insightful demonstration
-
Build an Orchestrator in Go (from Scratch)
Develop a deep understanding of Kubernetes and other orchestration systems by building your own wit
-
Facial Recognition Technology
Facial recognition technology is increasingly used for identity verification and identification, fr
-
Security Engineering and Tobias on Locks Two-Book Set
Wiley 出版A value-packed two-book set that combines the best of engineering dependable and secure software sy
-
Corporate Taxonomy
It is a question of observing the diversity of content on taxonomy and its existing construction me
-
Hands-On Microservices with Django
Packt 出版Unlock the potential of microservices architecture and master the art of building scalable and resi
-
Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in t
-
Mastering the Data Paradox
There are two remarkable phenomena that are unfolding almost simultaneously. The first is the emerg
-
-
SAP Analytics Cloud: Predictive Analytics
SAP Press 出版Today's organizations must be prepared for tomorrow's events. Forecast future behavior in SAP Analy
-
Topics in Cryptology - Ct-Rsa 2024
Springer 出版This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2
-
A Comprehensive Research Analysis on Effective Data Mining Techniques
This book provides for a deeper insight into the Data Mining Techniques used in the present day sce
-
Use and representation of the Internet by adolescents
An analysis of adolescents' representations and uses of computers connected to the Internet, unders
-
YouTube Success For Teens
Embark on an exciting journey into the world of YouTube with "YouTube Success for Teens." Packed wi
-
Mastering Adobe Commerce Frontend
Packt 出版A comprehensive guide to Adobe Commerce storefront development covering theme creation, customizati
-
Foggy Horizons
The book "Foggy Horizons: Unraveling the Potential of Fog Computing" provides a comprehensive explo
-
Embracing the Fog
"Embracing the Fog: Harnessing the Power of Mist Computing," the book explores the concept of mist
-
【電子書】自焚藏人檔案
雪域 出版2013年3月,美國國務院公布唯色獲得國際婦女勇氣獎的殊榮,但在3月8日領獎的這一天,唯色因為被政府監視、軟禁,無法獲得護照出國領獎。在中國統治下的西藏,政府以整個國家體制,對西藏的民族、語言、文化
-
-
The Virtual Evangelist
Sogyare 出版Can Virtual Evangelism serve as the primary catalyst for success in fulfilling the Great Commission
-
Mastery in Youtube
MASTERY IN YOUTUBE is a comprehensive guide to creating a successful YouTube channel. The book cove
-
Machine Learning for Cyber Security
Springer 出版This book constitutes the referred proceedings of the 5th International Conference on Machine Learn
-
Cloud Computing
Cloud Computing: Harnessing the Power of the Cloud" is a book that explores the various aspects of
-
Data Mining Based Stream Mining Approach
The Clustering is one of the most important technique in data mining. It aims partitioning the data
-
Beyond Humanity
Arnold Villeneuve has over 40 years of information technology, information management, and cybersec