客服公告:反詐騙!不碰ATM、網銀、不說信用卡,認證藍勾勾FB粉絲頁詳情
An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more
Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more
Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more
As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
A practical and comprehensive guide to the AWS Certified Security exam and your next AWS cloud security job In the newly......more
Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more
Decentralized algorithms are useful for solving large-scale complex optimization problems, which not only alleviate the ......more
Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more
Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more
...more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Internet-ontologies-Things explores how power mobilizes algorithmic and ontological objects, for example smartwatches an......more
Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any......more
The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers ha......more
Discover the vital role system engineers play in creating system and cyber security In an increasingly connected and inc......more
A no-fluff guide to implementing best practices for securing cloud native services. What are the best practices to secur......more
In an era where cybersecurity threats are escalating and complex global regulations are intensifying, the need for a com......more
In an era where cybersecurity threats are escalating and complex global regulations are intensifying, the need for a com......more
Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more
...more
Understand the fundamentals of network coding from an engineering perspective with this accessible guide Network Coding ......more
Often, the loudest threats are not the most dangerous. Discover a more intelligent way to assess and manage personal saf......more
Often, the loudest threats are not the most dangerous. Discover a more intelligent way to assess and manage personal saf......more
...more
Unlock the power of AI while ensuring your data security and customer privacy In Securing Microsoft Azure OpenAI, author......more
...more
...more
...more
...more
...more
Prepare for success on the 2024 CISA exam and further your career in security and audit with this effective study guide ......more
This proceedings constitutes the referred post-conference proceedings of the 16th International Conference on Mobile Mul......more
Understand the role of network communications in the private sector with this timely guide 4G and 5G wireless communicat......more
Authoritative and highly comprehensive guide on how emerging technologies can address various challenges in different se......more
...more
The aim of this book is to delineate the challenges faced by new generation mobile networks, such as 5G and forthcoming ......more
Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many......more
Machine Learning for Wireless Communications and Networking: An Introduction provides an easy-to-understand introduction......more
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the ent......more
Resource-Allocation in Wireless Communications: Fundamentals, Algorithms and Applications gives an easy- to-understand o......more
...more
...more
The ideal prep guide for earning your CCST Cybersecurity certification CCST Cisco Certified Support Technician Study Gui......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
A key element in the formation of smart cities is development based on cooperation between local governments and busines......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
Cyber Security and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Citie......more
...more
The essentials you need to learn about networking--10 books in one! With over 900 pages of clear and trustworthy informa......more
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and ......more
Learn to enhance your organizations cybersecurity through the NIST Cybersecurity Framework in this invaluable and access......more
...more
Technical theory, key technologies, and practical applications for consortium blockchains, with a solution to the CAP tr......more
we think about and manage networks. In today’s digital age, where connectivity is the lifeblood of our society, SDN has ......more
In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Tren......more
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focu......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
...more
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge thro......more
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain ......more
This book includes peer-reviewed papers presented at the 3rd International Conference on Emerging Electronics & Automati......more
According to the World Health Organization, digital health is a rapidly advancing science which is becoming increasingly......more
The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network f......more
Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies p......more
...more
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more
...more
Windows 11 in easy steps, 2nd edition guides you through discovering the key features and functions of Windows 11. In co......more
...more
This work discusses the impact of television show audience participation and expectations in the age of social media thr......more
The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and desc......more
The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and desc......more
Modern enterprises are facing growing cybersecurity issues due to the massive volume of security-related data they gener......more
"Recently, numerous researchers have turned their attention to the dynamical behaviors of complex dynamical networks (CD......more
Comprehensive guide to hybrid communication systems using visible light communication, radio over fiber, and auto channe......more
The new and improved guide to penetration testing using the legendary Metasploit Framework. The Metasploit Framework mak......more
Although recent advances in technology have made life easier for individuals, societies and states, they have also led t......more
...more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
...more
Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It i......more
In The Closing of the Auditor’s Mind? David J. O’Regan describes internal auditing as an important "binding agent" of so......more
In The Closing of the Auditor’s Mind? David J. O’Regan describes internal auditing as an important "binding agent" of so......more
In today’s interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient ......more
Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more
Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more
...more
This book gathers selected research papers presented at IEMTRONICS 2024 (International IoT, Electronics and Mechatronics......more
This edited volume discusses the topic of immersion, approaching it from the perspective of various media and stakeholde......more
This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple......more
A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more
A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more
Machine Learning for Low-Latency Communications presents the principles and practice of various deep learning methodolog......more