HOT YLE英檢

排序依

共有2001

Design of IT security policies

Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc......more

Artificial Intelligence: Third Caai International Conference, Cicai 2023, Fuzhou, China, July 22-23, 2023, Revised Selected Papers, Part I

Artificial Intelligence: Third Caai International Conference, Cicai 2023, Fuzhou, China, July 22-23, 2023, Revised Selected Papers, Part I

  • Ingram,出版日期:2024-02-04

This two-volume set LNAI 14473-14474 constitutes revised selected papers presented at the Third CAAI International Confe......more

Artificial Intelligence: Third Caai International Conference, Cicai 2023, Fuzhou, China, July 22-23, 2023, Revised Selected Papers, Part II

Artificial Intelligence: Third Caai International Conference, Cicai 2023, Fuzhou, China, July 22-23, 2023, Revised Selected Papers, Part II

  • Ingram,出版日期:2024-02-03

This two-volume set LNAI 14473-14474 constitutes revised selected papers presented at the Third CAAI International Confe......more

Hypothesis Generation and Interpretation: Design Principles and Patterns for Big Data Applications

Hypothesis Generation and Interpretation: Design Principles and Patterns for Big Data Applications

This book focuses in detail on data science and data analysis and emphasizes the importance of data engineering and data......more

Vision and Actualization in Academia: Georgia Tech’s College of Computing

Vision and Actualization in Academia: Georgia Tech’s College of Computing

Although difficult, change in academic structures is necessary today, especially in fast-changing fields today such as b......more

Cloud Security Success Stories

Cloud Security Success Stories

In today’s rapidly advancing digital landscape, the adoption of cloud technology has become a necessity for businesses o......more

Data Structure and Algorithms

Data Structure and Algorithms

A data structure is a specialized format for organizing, processing, retrieving and storing data. Several basic and adva......more

Social Vulnerability to Covid-19: Impacts of Technology Adoption and Information Behavior

Social Vulnerability to Covid-19: Impacts of Technology Adoption and Information Behavior

  • Ingram,出版日期:2024-02-02

This book provides an overview of the impact of the pandemic in China and the USA and presents a research agenda for use......more

The Tensions of Algorithmic Thinking: Automation, Intelligence and the Politics of Knowing

The Tensions of Algorithmic Thinking: Automation, Intelligence and the Politics of Knowing

  • Ingram,出版日期:2024-02-01

We are living in algorithmic times. From machine learning and artificial intelligence to blockchain or simpler newsfeed ......more

Silent Signals Unlocking Communication with Echonose

Silent Signals Unlocking Communication with Echonose

Silent Signals: Unlocking Communication with EchoNose," readers embark on a journey into the fascinating realm of silent......more

Cybernetics for the 21st Century Vol. 1: Epistemological Reconstruction

Cybernetics for the 21st Century Vol. 1: Epistemological Reconstruction

Cybernetics for the 21st Century Vol.1 is dedicated to the epistemological reconstruction of cybernetics, consisting of ......more

High Performance Computing in Science and Engineering ’21: Transactions of the High Performance Computing Center, Stuttgart (Hlrs) 2021

High Performance Computing in Science and Engineering ’21: Transactions of the High Performance Computing Center, Stuttgart (Hlrs) 2021

  • Ingram,出版日期:2024-02-01

This book presents the state-of-the-art in supercomputer simulation. It includes the latest findings from leading resear......more

Internet of Everything: Second Eai International Conference, Ioecon 2023, Guimarães, Portugal, September 28-29, 2023, Proceedings

Internet of Everything: Second Eai International Conference, Ioecon 2023, Guimarães, Portugal, September 28-29, 2023, Proceedings

  • Ingram,出版日期:2024-02-01

This book constitutes the refereed post-conference proceedings of the Second International Conference on Internet of Eve......more

HA High Availability Cluster at Proxmox

HA High Availability Cluster at Proxmox

Proxmox is an open source server virtualisation environment, with no limits on its use. Its Debian-based kernel allows t......more

Analysing Websites

Analysing Websites

  • Ingram,出版日期:2024-01-31

From a cluster of interconnected HTML pages to online service platforms, websites are constantly changing in form and fu......more

Hands-On Unity Game Development - Fourth Edition: Unlock the power of Unity 2023 and build your dream game

Hands-On Unity Game Development - Fourth Edition: Unlock the power of Unity 2023 and build your dream game

Unlock game development mastery with Unity 2023! This book takes you from conception to publication, equipping you with ......more

Building Recommendation Systems in Python and Jax: Hands-On Production Systems at Scale

Building Recommendation Systems in Python and Jax: Hands-On Production Systems at Scale

Implementing and designing systems that make suggestions to users are among the most popular and essential machine learn......more

Trolley Crash: Approaching Key Metrics for Ethical AI Practitioners, Researchers, and Policy Makers

Trolley Crash: Approaching Key Metrics for Ethical AI Practitioners, Researchers, and Policy Makers

  • Ingram,出版日期:2024-01-30

The prolific deployment of Artificial Intelligence (AI) across different fields has introduced novel challenges for AI d......more

Regulatory Compliance in Financial Cyber Security

Regulatory Compliance in Financial Cyber Security

In the modern digital world, where there is money, there are cyberattackers. According to IBM, the finance and insurance......more

Introduction to Wireless Sensor Network

Introduction to Wireless Sensor Network

Wireless Sensor Networks (WSNs) constitute a revolutionary paradigm in the realm of information gathering and monitoring......more

MATLAB for Machine Learning - Second Edition: Unlock the power of deep learning for swift and enhanced results

MATLAB for Machine Learning - Second Edition: Unlock the power of deep learning for swift and enhanced results

Master MATLAB tools for creating machine learning applications through effective code writing, guided by practical examp......more

Considerations on Cyber Behavior and Mass Technology in Modern Society

Considerations on Cyber Behavior and Mass Technology in Modern Society

In our fast-paced, technology-driven world, there is a strong sense of untapped potential and unfulfilled promises. Peop......more

Considerations on Cyber Behavior and Mass Technology in Modern Society

Considerations on Cyber Behavior and Mass Technology in Modern Society

In our fast-paced, technology-driven world, there is a strong sense of untapped potential and unfulfilled promises. Peop......more

LAN Party

LAN Party

Transport yourself back to the golden era of multiplayer PC gaming, when the internet was a place you built with your fr......more

Designing a Weather Based Web Application

Designing a Weather Based Web Application

This book aims to develop a sophisticated Weather Web Application that provides users with comprehensive and real-time m......more

Database Environment Enhanced Presumed Two Phase COMMIT Protocol

Database Environment Enhanced Presumed Two Phase COMMIT Protocol

In this book the authors provide an overview of COMMIT protocols that are used to coordinate participants in a distribut......more

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

  • Ingram,出版日期:2024-01-29

This book constitutes the refereed proceedings of the 30th International Conference on MultiMedia Modeling, MMM 2024, he......more

Learn Programming with C: An Easy Step-By-Step Self-Practice Book for Learning C

Learn Programming with C: An Easy Step-By-Step Self-Practice Book for Learning C

Authored by two standout professors in the fields of Computer Science and Technology with extensive experience in instru......more

Learn Programming with C: An Easy Step-By-Step Self-Practice Book for Learning C

Learn Programming with C: An Easy Step-By-Step Self-Practice Book for Learning C

Authored by two standout professors in the fields of Computer Science and Technology with extensive experience in instru......more

Swarm Intelligence for Iris Recognition

Swarm Intelligence for Iris Recognition

Swarm intelligence has been one of the methods of natural computing that falls under the artificial intelligence. The sw......more

Algorithms and Subjectivity: The Subversion of Critical Knowledge

Algorithms and Subjectivity: The Subversion of Critical Knowledge

In this thought-provoking volume, Eran Fisher interrogates the relationship between algorithms as epistemic devices and ......more

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems

This book researches the networked delay compensation and event-triggered control approaches for a series of CPSs subjec......more

A Selection of Image Processing Techniques: From Fundamentals to Research Front

A Selection of Image Processing Techniques: From Fundamentals to Research Front

This book focuses on seven commonly used image processing techniques. These are Image de-noising, Image de-blurring, Ima......more

The Gdpr Challenge: Privacy, Technology, and Compliance in an Age of Accelerating Change

The Gdpr Challenge: Privacy, Technology, and Compliance in an Age of Accelerating Change

  • Ingram,出版日期:2024-01-29

The book is a compilation of authoritative perspectives on General Data Protection Regulation (GDPR) of experts from Ind......more

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

  • Ingram,出版日期:2024-01-28

This book constitutes the refereed proceedings of the 30th International Conference on MultiMedia Modeling, MMM 2024, he......more

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

  • Ingram,出版日期:2024-01-28

This book constitutes the refereed proceedings of the 30th International Conference on MultiMedia Modeling, MMM 2024, he......more

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

Multimedia Modeling: 30th International Conference on Multimedia Modeling, MMM 2024, Amsterdam, the Netherlands, January 29 - February 2, 2

  • Ingram,出版日期:2024-01-28

This book constitutes the refereed proceedings of the 30th International Conference on MultiMedia Modeling, MMM 2024, he......more

Current Directions in Ict and Society: Ifip Tc9 50th Anniversary Anthology

Current Directions in Ict and Society: Ifip Tc9 50th Anniversary Anthology

  • Ingram,出版日期:2024-01-27

This project was motivated by the upcoming fiftieth anniversary of the IFIP Human Choice and Computers (HCC) conference,......more

Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023

Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023

  • Ingram,出版日期:2024-01-26

The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Dat......more

Artificial Intelligence and Machine Learning for Smart Community: Concepts and Applications

Artificial Intelligence and Machine Learning for Smart Community: Concepts and Applications

  • Ingram,出版日期:2024-01-26

Artificial Intelligence and Machine Learning for Smart Community: Concepts and Applications presents the evolution, chal......more

Practical Exercises for Multi-Usage Professional Software Calculators

Practical Exercises for Multi-Usage Professional Software Calculators

After twenty-two preceding sets of practical exercises laid forward in preceding manuscripts, I have inspired from my co......more

Emerging Technologies and cyber risk

Emerging Technologies and cyber risk

The world may be fast approaching the perfect storm, with the intersection of two major global trends. At a moment of hi......more

Applied Mathematics and Information Sciences

Applied Mathematics and Information Sciences

  • Ingram,出版日期:2024-01-26

Information science has long been a complex and interdisciplinary field. Recent developments in applied mathematics have......more

Introduction to Computation in Physical Sciences: Interactive Computing and Visualization with Python(tm)

Introduction to Computation in Physical Sciences: Interactive Computing and Visualization with Python(tm)

This book provides a practical and comprehensive introduction to computational problem solving from the viewpoints of pr......more

Quantum Artificial Intelligence with Qiskit

Quantum Artificial Intelligence with Qiskit

This book provides a cohesive overview of the field of QAI, providing the tools for readers to create and manipulate qua......more

An Introduction to Image Classification: From Designed Models to End-To-End Learning

An Introduction to Image Classification: From Designed Models to End-To-End Learning

Image classification is a critical component in computer vision tasks and has numerous applications. Traditional methods......more

How to Guard Against Adware and Spyware: The Complete Guide to Adware and Spyware Removal and Protection on Your Computer!

How to Guard Against Adware and Spyware: The Complete Guide to Adware and Spyware Removal and Protection on Your Computer!

How to Guard Against Spyware and Adware The Complete Guide To Adware And Spyware Removal And Protection On Your Computer......more

Experimentation in 5G and beyond Networks: State of the Art and the Way Forward

Experimentation in 5G and beyond Networks: State of the Art and the Way Forward

  • Ingram,出版日期:2024-01-25

Special Issue "Experimentation in 5G and beyond Networks: State of the Art and the Way Forward" collected original contr......more

Mathematical Methods and Applications for Artificial Intelligence and Computer Vision

Mathematical Methods and Applications for Artificial Intelligence and Computer Vision

  • Ingram,出版日期:2024-01-25

This Reprint comprises all of the accepted articles published as part of the Special Issue "Mathematical Methods and App......more

Basics of operating systems

Basics of operating systems

The book presents an introduction of the basics aspects of operating systems, including general terms, history, their ty......more

Building an API Product: Design, implement, and release API products that meet user needs

Building an API Product: Design, implement, and release API products that meet user needs

Unlock the power of APIs with expert guidance and techniques for successfully creating, testing, and maintaining product......more

Database Management System (SQL)

Database Management System (SQL)

Structural query language (SQL) is a programming language for storing and processing information in a relational databas......more

Cyber Security for Small Business

Cyber Security for Small Business

The world may be fast approaching the perfect storm, with the intersection of two major global trends. At a moment of hi......more

Introduction to Cloud Computing

Introduction to Cloud Computing

The book delves into the core components of cloud computing, such as Infrastructure as a Service (IaaS), Platform as a S......more

New Horizons in Web Search, Web Data Mining, and Web-Based Applications

New Horizons in Web Search, Web Data Mining, and Web-Based Applications

  • Ingram,出版日期:2024-01-24

In today’s era of rapid digitization and information technology advancement, web searching and web data mining stand at ......more

Recent Advances in Computer Vision Applications Using Parallel Processing

Recent Advances in Computer Vision Applications Using Parallel Processing

  • Ingram,出版日期:2024-01-24

This comprehensive book is primarily intended for researchers, computer vision specialists, and high-performance computi......more

Image Analysis and Processing - Iciap 2023 Workshops: Udine, Italy, September 11-15, 2023, Proceedings, Part I

Image Analysis and Processing - Iciap 2023 Workshops: Udine, Italy, September 11-15, 2023, Proceedings, Part I

  • Ingram,出版日期:2024-01-24

The two-volume set LNCS 14365 and 14366 constitutes the papers of workshops hosted by the 22nd International Conference ......more

Security in Design Phase of SDLC for Web Applications

Security in Design Phase of SDLC for Web Applications

This book describes three approaches for the security of web applications related to the current trends and threats impo......more

Green, Pervasive, and Cloud Computing: 18th International Conference, Gpc 2023, Harbin, China, September 22-24, 2023, Proceedings, Part I

Green, Pervasive, and Cloud Computing: 18th International Conference, Gpc 2023, Harbin, China, September 22-24, 2023, Proceedings, Part I

  • Ingram,出版日期:2024-01-23

This book constitutes the refereed proceedings of the 18th International Conference on Green, Pervasive, and Cloud Compu......more

Green, Pervasive, and Cloud Computing: 18th International Conference, Gpc 2023, Harbin, China, September 22-24, 2023, Proceedings; Part II

Green, Pervasive, and Cloud Computing: 18th International Conference, Gpc 2023, Harbin, China, September 22-24, 2023, Proceedings; Part II

  • Ingram,出版日期:2024-01-23

This book constitutes the refereed proceedings of the 18th International Conference on Green, Pervasive, and Cloud Compu......more

Domain Decomposition Methods in Science and Engineering XXVII

Domain Decomposition Methods in Science and Engineering XXVII

  • Ingram,出版日期:2024-01-23

These are the proceedings of the 27th International Conference on Domain Decomposition Methods in Science and Engineerin......more

Explainable Agency in Artificial Intelligence: Research and Practice

Explainable Agency in Artificial Intelligence: Research and Practice

  • Ingram,出版日期:2024-01-22

The book is a collection of cutting-edge research on the topic of explainable agency in artificial intelligence (XAI), i......more

Explainable Agency in Artificial Intelligence: Research and Practice

Explainable Agency in Artificial Intelligence: Research and Practice

  • Ingram,出版日期:2024-01-22

The book is a collection of cutting-edge research on the topic of explainable agency in artificial intelligence (XAI), i......more

Artificial Intelligence and Society 5.0: Issues, Opportunities, and Challenges

Artificial Intelligence and Society 5.0: Issues, Opportunities, and Challenges

  • Ingram,出版日期:2024-01-22

The text presents an artificial intelligence-based framework, algorithms, and applications from the perspective of socie......more

Image Analysis and Processing - Iciap 2023 Workshops: Udine, Italy, September 11-15, 2023, Proceedings, Part II

Image Analysis and Processing - Iciap 2023 Workshops: Udine, Italy, September 11-15, 2023, Proceedings, Part II

  • Ingram,出版日期:2024-01-21

The two-volume set LNCS 14365 and 14366 constitutes the papers of workshops hosted by the 22nd International Conference ......more

Understanding Digital Marketing: The principles of digital marketing explained simply and practically

Understanding Digital Marketing: The principles of digital marketing explained simply and practically

Would you like a book that teaches you about the principles of digital marketing in a simple and practical way? Then I c......more

Understanding Digital Marketing: The principles of digital marketing explained simply and practically

Understanding Digital Marketing: The principles of digital marketing explained simply and practically

Would you like a book that teaches you about the principles of digital marketing in a simple and practical way? Then I c......more

Prevention of SoC Failure with Cache Write Management Techniques

Prevention of SoC Failure with Cache Write Management Techniques

Advent of Very Large Scale Integration (VLSI) technology, enables embedding of a large class of electronic circuits with......more

Getroid

Getroid

Mobile phone has been an amazing invention, which revolutionized communication between humans. It has now become a piece......more

Encyclopedia of Computer Graphics and Games

Encyclopedia of Computer Graphics and Games

  • Ingram,出版日期:2024-01-19

Encyclopedia of Computer Graphics and Games (ECGG) is a unique reference resource tailored to meet the needs of research......more

Intelligent Software Defect Prediction

Intelligent Software Defect Prediction

With the increasing complexity of and dependency on software, software products may suffer from low quality, high prices......more

A Curriculum of Agape: Reimagining Love in the Classroom

A Curriculum of Agape: Reimagining Love in the Classroom

The term agape has become something of a mainstream concept, as it has graced America’s television screens through comme......more

Practical Exercises for Professional HRM Software Calculators

Practical Exercises for Professional HRM Software Calculators

After three preceding set of practical exercises laid forward in a manuscript on Business & Finance Softwares, I have in......more

Practical Exercises for Modern Physics and Construction Tools

Practical Exercises for Modern Physics and Construction Tools

After twenty-one preceding sets of practical exercises laid forward in preceding manuscripts, I have inspired from my co......more

Artificial intelligence technologies

Artificial intelligence technologies

This book covers the history, basic concepts and principles of artificial intelligence, as well as applications, ethical......more

AI-Driven Cyber Security

AI-Driven Cyber Security

Welcome to the forefront of modern cyber security - a landscape shaped and transformed by the relentless evolution of Ar......more

Template Based Vulnerability Scanner

Template Based Vulnerability Scanner

In today’s world, Cyber security has become an important leap in the form of jobs, education. But the reality is that on......more

Implementing a software vulnerabilities system

Implementing a software vulnerabilities system

Software bugs that result in memory corruption are a common and dangerous feature of systems developed in certain progra......more

Human-Computer Interaction: An Empirical Research Perspective

Human-Computer Interaction: An Empirical Research Perspective

Human-Computer Interaction: An Empirical Research Perspective is the definitive guide to empirical research in HCI. The ......more

Integrating Third-Party Logistics with SAP S/4hana

Integrating Third-Party Logistics with SAP S/4hana

"Working with external partners for logistics operations? Set up seamless communication between your systems with this a......more

The Essential Criteria of Graph Databases

The Essential Criteria of Graph Databases

The Essential Criteria of Graph Databases collects several truly innovative graph applications in asset-liability and li......more

Cybersecurity and International Relations

Cybersecurity and International Relations

This comprehensive journal explores the intricate intersection of cybersecurity and international relations in the digit......more

Algebraic, Analytic, and Computational Number Theory and Its Applications

Algebraic, Analytic, and Computational Number Theory and Its Applications

  • Ingram,出版日期:2024-01-16

Analytic number theory is a branch of number theory which uses methods from mathematical analysis in order to solve diff......more

Sourcing and Procurement with SAP S/4hana

Sourcing and Procurement with SAP S/4hana

Get all the essential details to set up and use SAP S/4HANA for sourcing and procurement! Follow step-by-step instructio......more

21上一頁 1 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類

縮小搜尋範圍

依購買狀態搜尋