排序依

共有22148

Digital Suffragists: Women, the Web, and the Future of Democracy

Digital Suffragists: Women, the Web, and the Future of Democracy

Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more

Safeguarding Adults Online: A Guide for Social Workers

Safeguarding Adults Online: A Guide for Social Workers

Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

The Physics of Wireless Communications

The Physics of Wireless Communications

Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more

Listen and Repair: A Guide for Information Security to Meet Future Demands

Listen and Repair: A Guide for Information Security to Meet Future Demands

An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more

CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam

CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam

The ideal prep guide for earning your CCST Cybersecurity certification CCST Cisco Certified Support Technician Study Gui......more

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many......more

Machine Learning for Wireless Communications and Networking: An Introduction

Machine Learning for Wireless Communications and Networking: An Introduction

Machine Learning for Wireless Communications and Networking: An Introduction provides an easy-to-understand introduction......more

Smart Electric Power: Integrating Power with Information for Smarter Cities

Smart Electric Power: Integrating Power with Information for Smarter Cities

Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more

Machine Learning for Malware Detection

Machine Learning for Malware Detection

  • Ingram,出版日期:2024-12-01

Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more

Securing Cloud Native Apps

Securing Cloud Native Apps

A no-fluff guide to implementing best practices for securing cloud native services. This book teaches you best practices......more

Linux Basics for Hackers, 2nd Edition

Linux Basics for Hackers, 2nd Edition

The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers ha......more

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

  • Ingram,出版日期:2024-11-01

Integrated sensing and communications (ISAC) is being seen as a technology to enable emerging applications such as vehic......more

Metasploit, 2nd Edition

Metasploit, 2nd Edition

The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the ......more

97 Things Every Application Security Professional Should Know

97 Things Every Application Security Professional Should Know

As technology continues to advance and more business is conducted online, the potential attack surface increases exponen......more

Endogenous Security & Safety Enabling Cyber Resiliency Engineering

Endogenous Security & Safety Enabling Cyber Resiliency Engineering

This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically exp......more

Secure Public Key Infrastructure: Standards, Pgp And Beyond

Secure Public Key Infrastructure: Standards, Pgp And Beyond

Designed for practitioners and researchers in industry, this wide-ranging handbook provides a professional-level examina......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: The US ......more

The Real Internet Architecture: Past, Present, and Future Evolution

The Real Internet Architecture: Past, Present, and Future Evolution

A new way to understand the architecture of today’s Internet, based on an innovative general model of network architectu......more

The Real Internet Architecture: Past, Present, and Future Evolution

The Real Internet Architecture: Past, Present, and Future Evolution

A new way to understand the architecture of today’s Internet, based on an innovative general model of network architectu......more

Cognitive Radio-Based Internet of Vehicles: Architectures, Applications and Open Issues

Cognitive Radio-Based Internet of Vehicles: Architectures, Applications and Open Issues

  • Ingram,出版日期:2024-08-01

The incorporation of Cognitive Radio (CR) into the Internet of Vehicles (IoV) has emerged as the Intelligent Transportat......more

Web 3.0: The Rise of Blockchain Technology in the Internet Ecosystem

Web 3.0: The Rise of Blockchain Technology in the Internet Ecosystem

  • Ingram,出版日期:2024-08-01

The book underscores AI’s transformative impact on reshaping physical, digital, and biological boundaries, converging wi......more

Learning Devsecops: Integrating Continuous Security Across Your Organization

Learning Devsecops: Integrating Continuous Security Across Your Organization

Learn how to implement continuous security throughout your entire software development and delivery pipeline. With this ......more

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more

Research Advances in Network Technologies (Volume 2)

Research Advances in Network Technologies (Volume 2)

  • Ingram,出版日期:2024-07-26

In the present technological age, information is a valuable resource for both small and large enterprises as well as for......more

Secure and Smart Cyber-Physical Systems

Secure and Smart Cyber-Physical Systems

  • Ingram,出版日期:2024-07-24

Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the interc......more

Dynamical Behaviors of Multiweighted Complex Network Systems

Dynamical Behaviors of Multiweighted Complex Network Systems

Highly comprehensive resource for studying neural networks, complex networks, synchronization, passivity, and associated......more

Blockchain and Digital Twin Enabled Iot Networks: Privacy and Security Perspectives

Blockchain and Digital Twin Enabled Iot Networks: Privacy and Security Perspectives

  • Ingram,出版日期:2024-07-19

The book reviews research works in recent trends in blockchain, AI, and Digital Twin based IoT data analytics approaches......more

Performance Analysis of Cooperative Networking with Multi Channels

Performance Analysis of Cooperative Networking with Multi Channels

This book will be the reference book under wireless cooperative communication and Advanced communication techniques for ......more

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regu......more

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regu......more

Wireless Quantum Networks, Volume 1: Intelligent Continuous Variable Technology

Wireless Quantum Networks, Volume 1: Intelligent Continuous Variable Technology

Understand the future of wireless communication with this groundbreaking guide Quantum physics and quantum communication......more

Wireless Quantum Networks, Volume 2: Quantum Vs Post Quantum Security: Algorithms and Design Technology

Wireless Quantum Networks, Volume 2: Quantum Vs Post Quantum Security: Algorithms and Design Technology

"This is a comprehensive description of the principles, algorithms, design technology, quantum machine learning and quan......more

Crypto Millionaires: Blockchain: A Chance for All?

Crypto Millionaires: Blockchain: A Chance for All?

Blockchain: The Key to the World of Cryptocurrencies. A word that sounds like a promise of wealth. But what exactly is B......more

Crypto Millionaires: Blockchain: A Chance for All?

Crypto Millionaires: Blockchain: A Chance for All?

Blockchain: The Key to the World of Cryptocurrencies. A word that sounds like a promise of wealth. But what exactly is B......more

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more

Signals and Systems: A Primer with Matlab(r)

Signals and Systems: A Primer with Matlab(r)

The idea of signals and systems arises in different disciplines such as science, engineering, economics, politics, and m......more

Hands-On Differential Privacy

Hands-On Differential Privacy

  • Ingram,出版日期:2024-07-02

Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover hea......more

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

  • Ingram,出版日期:2024-06-28

With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digit......more

Intelligent Systems of Computing and Informatics

Intelligent Systems of Computing and Informatics

  • Ingram,出版日期:2024-06-26

Since 2011, the fourth industrial revolution (IR4.0) has played significant roles in education, research as well as in t......more

Developing Cybersecurity Programs and Policies

Developing Cybersecurity Programs and Policies

Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governan......more

Applying Artificial Intelligence in Cyber Security Analytics and Cyber Threat Detection

Applying Artificial Intelligence in Cyber Security Analytics and Cyber Threat Detection

Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loophole......more

Network Security Empowered by Artificial Intelligence

Network Security Empowered by Artificial Intelligence

  • Ingram,出版日期:2024-06-10

This book introduces cutting-edge methods on security in spectrum management, mobile networks and next-generation wirele......more

The Expert in the Next Office: Managing Operations & Security in the Era of Cyberspace

The Expert in the Next Office: Managing Operations & Security in the Era of Cyberspace

As organizations increasingly depend on electronic information, the lack of systematic training on effective operations ......more

The Character of Consent: The History of Cookies and the Future of Technology Policy

The Character of Consent: The History of Cookies and the Future of Technology Policy

"A timely history of digital consent told through the mundane yet highly contested web cookie: confronting cookies is an......more

Dark Wire: The Incredible True Story of the Largest Sting Operation in History

Dark Wire: The Incredible True Story of the Largest Sting Operation in History

This cat-and-mouse story of a vast FBI sting operation reveals​ how the criminal underworld has become a globalized econ......more

The Cybersecurity Guide to Governance, Risk, and Compliance

The Cybersecurity Guide to Governance, Risk, and Compliance

Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant conc......more

Internet of Things Vulnerabilities and Recovery Strategies

Internet of Things Vulnerabilities and Recovery Strategies

  • Ingram,出版日期:2024-06-04

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devi......more

Ubiquitous and Transparent Security: Challenges and Applications

Ubiquitous and Transparent Security: Challenges and Applications

  • Ingram,出版日期:2024-06-04

In an increasingly interconnected digital realm, "Ubiquitous and Transparent Security: Challenges and Applications" emer......more

Social Engineering in Cybersecurity: Threats and Defenses

Social Engineering in Cybersecurity: Threats and Defenses

  • Ingram,出版日期:2024-06-03

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical ......more

Augmented Reality: Fundamentals and Applications: Fundamentals and Applications

Augmented Reality: Fundamentals and Applications: Fundamentals and Applications

This book focuses on augmented reality (AR) technology, which uses the real environment to superimpose virtual elements.......more

Physical Layer Security for 6g Networks

Physical Layer Security for 6g Networks

  • Ingram,出版日期:2024-06-01

6G networks are expected to provide one-microsecond latency communication with a billion of devices expected to compete ......more

Proof-Of-Stake for Blockchain Networks: Fundamentals, Challenges and Approaches

Proof-Of-Stake for Blockchain Networks: Fundamentals, Challenges and Approaches

  • Ingram,出版日期:2024-06-01

A consensus mechanism is the core component of a blockchain network, which ensures that every participant agrees on the ......more

Tinyml for Edge Intelligence in Iot and Lpwan Networks

Tinyml for Edge Intelligence in Iot and Lpwan Networks

  • Ingram,出版日期:2024-06-01

TinyML for Edge Intelligence in IoT and LPWAN Networks presents the evolution, developments, and advances in TinyML as a......more

Fundamentals of Optical Networks and Components

Fundamentals of Optical Networks and Components

This book is intended as an undergraduate/postgraduate level textbook for courses on high-speed optical networks as well......more

Deception in Autonomous Transport Systems: Threats, Impacts and Mitigation Policies

Deception in Autonomous Transport Systems: Threats, Impacts and Mitigation Policies

  • Ingram,出版日期:2024-05-30

This book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating th......more

Program or Be Programmed: Ten Commandments for a Digital Age

Program or Be Programmed: Ten Commandments for a Digital Age

  • Ingram,出版日期:2024-05-28

The debate over whether the Net is good or bad for us fills the airwaves and the blogosphere. But for all the heat of cl......more

Proceedings of Third International Conference on Computing and Communication Networks: ICCCN 2023, Volume 1

Proceedings of Third International Conference on Computing and Communication Networks: ICCCN 2023, Volume 1

  • Ingram,出版日期:2024-05-26

This book includes selected peer-reviewed papers presented at third International Conference on Computing and Communicat......more

Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives

Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives

  • Ingram,出版日期:2024-05-23

This volume examines how the adoption of AI technologies is likely to impact strategic and operational planning, and the......more

Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives

Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives

  • Ingram,出版日期:2024-05-23

This volume examines how the adoption of AI technologies is likely to impact strategic and operational planning, and the......more

Advanced Mobile Communications: Inner Physical Layer Transceiver

Advanced Mobile Communications: Inner Physical Layer Transceiver

This book is an extensively elaborated treatise on physical layer concepts of advanced mobile communications. Setting ou......more

Advanced Mobile Communications: Sophisticated Channel Codes

Advanced Mobile Communications: Sophisticated Channel Codes

This book is an extensively elaborated treatise on sophisticated channel coding for advanced mobile communications. Sett......more

Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence

Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence

Su’s book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the fi......more

2221 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類