-
【電子書】近代會黨與民間信仰研究
秀威資訊 出版全書分為近代會黨與民間信仰兩大既有區別又有聯繫的部分。 近代會黨部分以檔案為中心,集中闡釋了太平天國時期、辛亥革命時期會黨運動的歷史軌跡、代表人物以其與時代潮流的互動作用。 民間信仰部分以經典為中心
-
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
The Case Against Memes
The Case Against Memes takes an in-depth look at meme culture and debunks many prevailing culture m
-
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide
Ingram 出版The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP
-
Big Data and Social Computing
Springer 出版This book constitutes refereed proceedings of the 7th China National Conference on Big Data and Soc
-
Robotics, Computer Vision and Intelligent Systems
Springer 出版This volume constitutes the papers of two workshops which were held in conjunctionwith the First In
-
The Cloud in Iot-Enabled Spaces
Ingram 出版The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions propos
-
-
-
-
【電子書】中國即將發生政變:解析政變前夜的九大關鍵人物
時報文化 出版中國必將發生政變,而在政變前夜掌握一切的中共領導人將會是誰?中共正處於一場革命或政變的前夜,這不是危言聳聽,而是中國社會的結構、矛盾和現狀告訴人們,這一場革命或政變在今後十年內或遲或早必然要發生,而
-
中國即將發生政變:解析政變前夜的九大關鍵人物
目前有2人說過讚時報文化 出版中國必將發生政變,而在政變前夜掌握一切的中共領導人將會是誰?中共正處於一場革命或政變的前夜,這不是危言聳聽,而是中國社會的結構、矛盾和現狀告訴人們,這一場革命或政變在今後十年內或遲或早必然要發生,而
-
-
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, th
-
Learning Salesforce Development with Apex
Ingram 出版Learn to harness the power of the Apex language to build Salesforce applications DESCRIPTIONAcquiri
-
Modern Cybersecurity Strategies for Enterprises
Ingram 出版Security is a shared responsibility, and we must all own it KEY FEATURES ● Expert-led instruc
-
Data for All
Gain in-depth knowledge about how companies manipulate and exploit personal data. A book that does
-
Defending Cyber Systems Through Reverse Engineering of Criminal Malware
Springer 出版Introduction to The Fascinating World of Malware Analysis.- Static Analysis of Malware.- Behavioral
-
Secure Multi-Party Computation Against Passive Adversaries
Springer 出版This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also
-
-
-
Safety and Security of Cyber-Physical Systems
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with e
-
Web Application Development with Streamlit
Apress 出版Transition from a back-end developer to a full-stack developer with knowledge of all the dimensions
-
【電子書】中國:革命到崛起
聯經 出版中國正在崛起,成為世界強權,不過中國的崛起具有甚麼普世的意義,代表怎樣的歷史突破,仍然並不明朗,更為周邊國家所憂慮。在中文世界內外,關於中國崛起的討論連篇纍牘,但是有一些議題、一些觀察角度似乎乏人問
-
【電子書】中國:革命到崛起(思想18)
聯經 出版中國正在崛起,成為世界強權,不過中國的崛起具有甚麼普世的意義,代表怎樣的歷史突破,仍然並不明朗,更為周邊國家所憂慮。在中文世界內外,關於中國崛起的討論連篇纍牘,但是有一些議題、一些觀察角度似乎乏人問
-
中國:革命到崛起(思想18)
聯經 出版中國正在崛起,成為世界強權,不過中國的崛起具有甚麼普世的意義,代表怎樣的歷史突破,仍然並不明朗,更為周邊國家所憂慮。在中文世界內外,關於中國崛起的討論連篇纍牘,但是有一些議題、一些觀察角度似乎乏人問
-
Build a Personal Brand and Find the Right Niche
Max Alices 出版Do you want to know how to build your personal brand on social media? Your customers will never sto
-
-
【電子書】泰國:獨特的君主立憲制國家【第二版】
城市大學 出版香港雖然是一個重要的金融中心及國際城市,但一般香港人對周邊亞洲國家的認識卻相當片面。由於殖民地歷史和西方媒體的影響,香港人對英美的了解遠較對日本、南韓和東南亞諸國為佳。事實上,大專院校本科學生要在港
-
Blockchain Security from the Bottom Up
Wiley 出版The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the
-
Internet and Web Application Security
Ingram 出版Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mob
-
Ethical Hacking: Techniques, Tools, and Countermeasures
Ingram 出版Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategie
-
【電子書】為人民服務:兩岸制度競爭的核心
秀威資訊 出版本書認為西方式的民主不足以作為兩岸政權競爭的評比標準,而必須以兩岸政府對人民的服務績效來評判優劣,這才是兩岸制度競爭的核心。作者在書中以兩岸政府近年應變天災的具體作法為例,逐一比較,試圖為兩岸關係提
-
Secret Key Cryptography
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical met
-
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Wiley 出版The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles,
-
Networks Rising
Ingram 出版For the second time in human history, we are on the verge of broad new breakthroughs in health, pro
-
Linux Fundamentals
The Linux world is constantly changing, requiring new knowledge and skills to work as a Linux syste
-
Cybersecurity Essentials
About the BookIf you need to read only one book to acquire a strong foundation in cybersecurity fun
-
Briefs Anthology Volume 3
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 1
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 2
Ingram 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Exploration of Novel Intelligent Optimization Algorithms
Springer 出版This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, hel
-
Security Engineering for Embedded and Cyber-Physical Systems
CRC Press 出版Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at
-
The Weakest Link
Mit Press 出版An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and ac
-
Assured Autonomy Survey
Autonomous systems will soon be ubiquitous in our society, saving us time, performing tasks we do n
-
Web Search Engines With Particular Reference
There are many search engines that facilitate information retrieval from the World Wide Web. Howeve
-