Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more
Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more
As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more
...more
Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any......more
...more
...more
Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more
Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more
Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many......more
Machine Learning for Wireless Communications and Networking: An Introduction provides an easy-to-understand introduction......more
The ideal prep guide for earning your CCST Cybersecurity certification CCST Cisco Certified Support Technician Study Gui......more
...more
Discover the vital role system engineers play in creating system and cyber security In an increasingly connected and inc......more
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other profe......more
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain ......more
The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network f......more
...more
...more
A no-fluff guide to implementing best practices for securing cloud native services. This book teaches you best practices......more
...more
The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers ha......more
A practical and comprehensive guide to the AWS Certified Security exam and your next AWS cloud security job In the newly......more
Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies p......more
Low-latency communications attracts considerable attention from both academia and industry, given its potential to suppo......more
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workl......more
The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. One of the m......more
...more
...more
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically exp......more
The book is a modern primer on propaganda. Disinformation, trolls, bots, information influence, psychological operations......more
The book is a modern primer on propaganda. Disinformation, trolls, bots, information influence, psychological operations......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
The debate over whether the Net is good or bad for us fills the airwaves and the blogosphere. But for all the heat of cl......more
The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the ......more
As technology continues to advance and more business is conducted online, the potential attack surface increases exponen......more
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, auto......more
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more
...more
...more
...more
Accompanying The Metaverse: A Critical Introduction in CRC Press’ new The Metaverse Series, this book explores the ways ......more
Accompanying The Metaverse: A Critical Introduction in CRC Press’ new The Metaverse Series, this book explores the ways ......more
The fantasies that underpin common perceptions of Virtual Reality--and what we need to know about VR’s potential risks a......more
This book explores the social forces among and between online aggressors that affect the expression and perpetration of ......more
This book explores the social forces among and between online aggressors that affect the expression and perpetration of ......more
Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more
Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety......more
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety......more
For the second time in human history, we are on the verge of broad new breakthroughs in health, productivity, and person......more
Unregulated technology threatens truth, democracy, and humanity itself... Following up his groundbreaking book Digital i......more
"The Next Generation Innovation in IoT and Cloud Computing with Applications" is a thought-provoking edited book that ex......more
A Practical Introduction to Virtual Reality: From Concepts to Executables is written for the undergraduate computer scie......more
Emerging healthcare networks are interconnected physical systems that use cyber technologies for interaction and functio......more
...more
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in ......more
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a compre......more
Construction Audit is becoming more and more prevalant, and organizations are appreciating its importance. Learning the ......more
Construction Audit is becoming more and more prevalant, and organizations are appreciating its importance. Learning the ......more
Su’s book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the fi......more
...more
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practic......more
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practic......more
...more
...more
Designed for practitioners and researchers in industry, this wide-ranging handbook provides a professional-level examina......more
The book underscores AI’s transformative impact on reshaping physical, digital, and biological boundaries, converging wi......more
...more
A new way to understand the architecture of today’s Internet, based on an innovative general model of network architectu......more
A new way to understand the architecture of today’s Internet, based on an innovative general model of network architectu......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
"Introduction to IoT" is an insightful book that serves as a comprehensive guide to understanding the foundations and ke......more
"Introduction to IoT" is an insightful book that serves as a comprehensive guide to understanding the foundations and ke......more
...more
...more
The incorporation of Cognitive Radio (CR) into the Internet of Vehicles (IoV) has emerged as the Intelligent Transportat......more
...more
...more
Learn how to implement continuous security throughout your entire software development and delivery pipeline. With this ......more
...more
Learn the essential skills you need to pass the Cisco Certified Network Associate (CCNA) from the creator of one of the ......more
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more
The idea of signals and systems arises in different disciplines such as science, engineering, economics, politics, and m......more