排序依

共有22455

Digital Suffragists: Women, the Web, and the Future of Democracy

Digital Suffragists: Women, the Web, and the Future of Democracy

Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more

Safeguarding Adults Online: A Guide for Social Workers

Safeguarding Adults Online: A Guide for Social Workers

Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

The Physics of Wireless Communications

The Physics of Wireless Communications

Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more

Listen and Repair: A Guide for Information Security to Meet Future Demands

Listen and Repair: A Guide for Information Security to Meet Future Demands

An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more

Autonomous Cyber Resilience

Autonomous Cyber Resilience

  • Ingram,出版日期:2025-02-26

Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any......more

Machine Learning for Malware Detection

Machine Learning for Malware Detection

  • Ingram,出版日期:2025-01-31

Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more

Smart Electric Power: Integrating Power with Information for Smarter Cities

Smart Electric Power: Integrating Power with Information for Smarter Cities

Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many......more

Machine Learning for Wireless Communications and Networking: An Introduction

Machine Learning for Wireless Communications and Networking: An Introduction

Machine Learning for Wireless Communications and Networking: An Introduction provides an easy-to-understand introduction......more

CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam

CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam

The ideal prep guide for earning your CCST Cybersecurity certification CCST Cisco Certified Support Technician Study Gui......more

Security: A Systems Engineering Approach

Security: A Systems Engineering Approach

Discover the vital role system engineers play in creating system and cyber security In an increasingly connected and inc......more

Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking

With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other profe......more

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain ......more

The Core Network for 5g Advanced

The Core Network for 5g Advanced

The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network f......more

Securing Cloud Native Apps

Securing Cloud Native Apps

A no-fluff guide to implementing best practices for securing cloud native services. This book teaches you best practices......more

Linux Basics for Hackers, 2nd Edition

Linux Basics for Hackers, 2nd Edition

The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers ha......more

Aws Certified Security Study Guide: Specialty (Scs-C02) Exam

Aws Certified Security Study Guide: Specialty (Scs-C02) Exam

A practical and comprehensive guide to the AWS Certified Security exam and your next AWS cloud security job In the newly......more

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

  • Ingram,出版日期:2024-11-01

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies p......more

Machine Learning for Low-Latency Communications

Machine Learning for Low-Latency Communications

Low-latency communications attracts considerable attention from both academia and industry, given its potential to suppo......more

Tabletop Exercises

Tabletop Exercises

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. One of the m......more

Endogenous Security & Safety Enabling Cyber Resiliency Engineering

Endogenous Security & Safety Enabling Cyber Resiliency Engineering

This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically exp......more

Propaganda: From Disinformation and Influence to Operations and Information Warfare

Propaganda: From Disinformation and Influence to Operations and Information Warfare

The book is a modern primer on propaganda. Disinformation, trolls, bots, information influence, psychological operations......more

Propaganda: From Disinformation and Influence to Operations and Information Warfare

Propaganda: From Disinformation and Influence to Operations and Information Warfare

The book is a modern primer on propaganda. Disinformation, trolls, bots, information influence, psychological operations......more

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more

Program or Be Programmed: Ten Commandments for a Digital Age

Program or Be Programmed: Ten Commandments for a Digital Age

  • Ingram,出版日期:2024-10-01

The debate over whether the Net is good or bad for us fills the airwaves and the blogosphere. But for all the heat of cl......more

Metasploit, 2nd Edition

Metasploit, 2nd Edition

The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the ......more

97 Things Every Application Security Professional Should Know

97 Things Every Application Security Professional Should Know

As technology continues to advance and more business is conducted online, the potential attack surface increases exponen......more

Black Hat Bash: Bash Scripting for Hackers and Pentesters

Black Hat Bash: Bash Scripting for Hackers and Pentesters

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, auto......more

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

  • Ingram,出版日期:2024-09-25

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more

The Metaverse for Learning and Education

The Metaverse for Learning and Education

Accompanying The Metaverse: A Critical Introduction in CRC Press’ new The Metaverse Series, this book explores the ways ......more

The Metaverse for Learning and Education

The Metaverse for Learning and Education

Accompanying The Metaverse: A Critical Introduction in CRC Press’ new The Metaverse Series, this book explores the ways ......more

Fantasies of Virtual Reality: Untangling Fiction, Fact, and Threat

Fantasies of Virtual Reality: Untangling Fiction, Fact, and Threat

The fantasies that underpin common perceptions of Virtual Reality--and what we need to know about VR’s potential risks a......more

Social Processes of Online Hate

Social Processes of Online Hate

  • Ingram,出版日期:2024-09-06

This book explores the social forces among and between online aggressors that affect the expression and perpetration of ......more

Social Processes of Online Hate

Social Processes of Online Hate

  • Ingram,出版日期:2024-09-06

This book explores the social forces among and between online aggressors that affect the expression and perpetration of ......more

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more

Networks Rising: Thinking Together in a Connected World

Networks Rising: Thinking Together in a Connected World

For the second time in human history, we are on the verge of broad new breakthroughs in health, productivity, and person......more

The Next Generation Innovation in Iot and Cloud Computing with Applications

The Next Generation Innovation in Iot and Cloud Computing with Applications

  • Ingram,出版日期:2024-09-03

"The Next Generation Innovation in IoT and Cloud Computing with Applications" is a thought-provoking edited book that ex......more

A Practical Introduction to Virtual Reality: From Concepts to Executables

A Practical Introduction to Virtual Reality: From Concepts to Executables

A Practical Introduction to Virtual Reality: From Concepts to Executables is written for the undergraduate computer scie......more

Cybersecurity in Emerging Healthcare Systems

Cybersecurity in Emerging Healthcare Systems

  • Ingram,出版日期:2024-09-01

Emerging healthcare networks are interconnected physical systems that use cyber technologies for interaction and functio......more

Cloud Security: Concepts, Applications and Practices

Cloud Security: Concepts, Applications and Practices

  • Ingram,出版日期:2024-08-28

This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in ......more

The Routledge International Handbook of Online Deviance

The Routledge International Handbook of Online Deviance

  • Ingram,出版日期:2024-08-27

Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a compre......more

Construction Audit: Building a Solid Foundation

Construction Audit: Building a Solid Foundation

Construction Audit is becoming more and more prevalant, and organizations are appreciating its importance. Learning the ......more

Construction Audit: Building a Solid Foundation

Construction Audit: Building a Solid Foundation

Construction Audit is becoming more and more prevalant, and organizations are appreciating its importance. Learning the ......more

Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence

Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence

Su’s book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the fi......more

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practic......more

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practic......more

Secure Public Key Infrastructure: Standards, Pgp And Beyond

Secure Public Key Infrastructure: Standards, Pgp And Beyond

Designed for practitioners and researchers in industry, this wide-ranging handbook provides a professional-level examina......more

Web 3.0: The Rise of Blockchain Technology in the Internet Ecosystem

Web 3.0: The Rise of Blockchain Technology in the Internet Ecosystem

  • Ingram,出版日期:2024-08-08

The book underscores AI’s transformative impact on reshaping physical, digital, and biological boundaries, converging wi......more

The Real Internet Architecture: Past, Present, and Future Evolution

The Real Internet Architecture: Past, Present, and Future Evolution

A new way to understand the architecture of today’s Internet, based on an innovative general model of network architectu......more

The Real Internet Architecture: Past, Present, and Future Evolution

The Real Internet Architecture: Past, Present, and Future Evolution

A new way to understand the architecture of today’s Internet, based on an innovative general model of network architectu......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more

Iot Fundamentals with a Practical Approach

Iot Fundamentals with a Practical Approach

"Introduction to IoT" is an insightful book that serves as a comprehensive guide to understanding the foundations and ke......more

Iot Fundamentals with a Practical Approach

Iot Fundamentals with a Practical Approach

"Introduction to IoT" is an insightful book that serves as a comprehensive guide to understanding the foundations and ke......more

Cognitive Radio-Based Internet of Vehicles: Architectures, Applications and Open Issues

Cognitive Radio-Based Internet of Vehicles: Architectures, Applications and Open Issues

  • Ingram,出版日期:2024-08-01

The incorporation of Cognitive Radio (CR) into the Internet of Vehicles (IoV) has emerged as the Intelligent Transportat......more

Learning Devsecops: Integrating Continuous Security Across Your Organization

Learning Devsecops: Integrating Continuous Security Across Your Organization

Learn how to implement continuous security throughout your entire software development and delivery pipeline. With this ......more

Acing the CCNA Exam

Acing the CCNA Exam

Learn the essential skills you need to pass the Cisco Certified Network Associate (CCNA) from the creator of one of the ......more

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more

Signals and Systems: A Primer with Matlab(r)

Signals and Systems: A Primer with Matlab(r)

The idea of signals and systems arises in different disciplines such as science, engineering, economics, politics, and m......more

2251 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類