This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
The Handbook of Data & Networks Security builds on the information and expertise conveyed in the existing Handbook of Da......more
An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more
Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more
Take an evidence-based approach to cybersecurity control design A call to action for enterprises to demand a modern, dat......more
Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more
...more
...more
Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more
A no-fluff guide to implementing best security practices for microservices in the cloud written by a team of experienced......more
Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more
Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more
Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any......more
As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more
...more
Tactile Internet for a Human-Centred Metaverse is a groundbreaking, comprehensive guide to this innovative communication......more
...more
...more
Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more
This book explores the transformative role of open-source technologies and digital commons in fostering a cooperative an......more
...more
Understanding Satellite Navigation, 2nd Edition explains the basic principles of satellite navigation technology with th......more
Cybersecurity is often examined through the lens of national security and organizational risks, focusing on data breache......more
Cybersecurity is often examined through the lens of national security and organizational risks, focusing on data breache......more
Informative reference on the state of the art in cybersecurity and how to achieve a more secure cyberspace AI for Cybers......more
...more
The synergy between fog computing and the IoT facilitates the growth of smart applications and services, empowering vari......more
Written "in the manner of a good crime thriller" (The Wall Street Journal), the inside story of the largest law-enforcem......more
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolvin......more
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure Securing Cloud Containers: Buildi......more
...more
The latest version of the gold standard in Ubuntu Linux resources In the freshly updated eleventh edition of Ubuntu Linu......more
No experience with PowerShell? No problem! Learn how to leverage the versatile toolkit installed on every Windows comput......more
...more
Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to u......more
This practical introduction to collaborative security testing, or "purple teaming," is a hands-on, lab-based guide to ke......more
...more
...more
The industry gold standard in Linux guides, fully updated In the newly updated eleventh edition of the Linux Bible, vete......more
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersec......more
...more
...more
Non-Terrestrial Networks: Paving the Way Towards Global Connectivity presents technologies that are important for NTNs -......more
Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more
Skip the fluff and quickly master the essentials with this accurate CompTIA A+ certification test prep In the second edi......more
Skip the fluff and quickly master the essentials with this accurate CompTIA A+ certification test prep In the second edi......more
...more
...more
...more
Fundamentals of Fog Computing and the Internet of Things for Smart Healthcare explores the intersection of two transform......more
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration t......more
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration t......more
An accessible journey through the seam that connects the digital world of the Internet to our physical world. The stack-......more
...more
This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more
This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more
Metaverse in the Healthcare Industry: Potential Applications, Tools, and Techniques explores the intersection of rapidly......more
The inventor of the World Wide Web explores his vision’s promise--and how it can be redeemed for the future. Perhaps the......more
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and mainta......more
Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysi......more
The Definitive Game Narrative Guide is the ultimate start and end point for storytelling in video games. Whether you’re ......more
Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysi......more
The Definitive Game Narrative Guide is the ultimate start and end point for storytelling in video games. Whether you’re ......more
...more
...more
...more
When developing a service, whether it’s a web service or a microservice, an application programming interface (API) is e......more
6G-Life: Unveiling the Future of Technological Sovereignty, Sustainability and Trustworthiness, gives a journey into the......more
The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more
The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more
This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and IT management, discus......more
This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and IT management, discus......more
...more
...more
Digital tools such as smart devices, personal trackers and social media have become part of daily life for many. ’Onlife......more
Learn essential strategies to streamline and secure your organization’s data handling from a cybersecurity expert who ha......more
...more
The book serves two very important purposes. One the concept and vulnerabilities due to cyber attacks in all walks of li......more
...more
Our seventh and eighth graders are now "officially" teens and online activities are second nature. "From Street-smart to......more
Our seventh and eighth graders are now "officially" teens and online activities are second nature. "From Street-smart to......more
’A welcome counterpoint to the technopanic that screen time is causing a mental health crisis’ Bruce Hood ’A rare mix of......more
...more
Find security holes before the bad guys do. Break into the world of vulnerability research--or expand your cybersecurity......more
Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more
This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast oce......more
This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast oce......more
This book delves into the complex landscape of autonomous urban mobility, analysing the factors that influence public ad......more
This book provides a comprehensive exploration of the rapidly evolving field of autonomous urban mobility, examining its......more
This book delves into the complex landscape of autonomous urban mobility, analysing the factors that influence public ad......more
This book provides a comprehensive exploration of the rapidly evolving field of autonomous urban mobility, examining its......more
...more