客服公告:反詐騙!提醒您「不碰ATM、網銀,不說信用卡資料」詳情

  • 防疫專區
  • 電子票券
  • 每日簽到
  • 今日66折
  • 天天BUY
兒童暑期閱讀

排序依

共有19905

Machine Learning for Malware Detection

Machine Learning for Malware Detection

  • Ingram,出版日期:2024-12-01

...more

Safeguarding Adults Online: A Guide for Social Workers

Safeguarding Adults Online: A Guide for Social Workers

Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many......more

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Digital Hell: The Inner Workings of a
Sdn and Nfv: A New Dimension to Virtualization

Sdn and Nfv: A New Dimension to Virtualization

Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutioni......more

Assimilation of Internet of Things (Iot) and Smart Grids
The Official (Isc)2 Ccsp Cbk Reference

The Official (Isc)2 Ccsp Cbk Reference

The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated. Cer......more

Into the Metaverse: The Essential Guide to the Business Opportunities of the New Internet

Into the Metaverse: The Essential Guide to the Business Opportunities of the New Internet

An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more

Microsoft Azure for Dummies

Microsoft Azure for Dummies

While the full array of services available is vast, Microsoft Azure For Dummies 2e provides a simple overview of Azure’s......more

Cybersecurity All-In-One for Dummies

Cybersecurity All-In-One for Dummies

Lock down your computers, devices, and business systems With so much data being shared and stored online and in networks......more

Practical Cloud Native Security with Falco: Risk and Threat Detection for Containers, Kubernetes, and Cloud

Practical Cloud Native Security with Falco: Risk and Threat Detection for Containers, Kubernetes, and Cloud

As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant w......more

Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems

Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems

  • Ingram,出版日期:2023-01-01

Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficien......more

Wireless Networks Technology and Cybersecurity

Wireless Networks Technology and Cybersecurity

Designed for professionals and students of networking and cryptography, this book covers key concepts and issues related......more

Computer Forensics: Computer Crime Scene Investigation

Computer Forensics: Computer Crime Scene Investigation

Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and s......more

Securing Delay-Tolerant Networks with Bpsec

Securing Delay-Tolerant Networks with Bpsec

Securing Delay-Tolerant Networks with BPSec answers the question Âhow can delay-tolerant networks be secured when operat......more

Ai-Enabled 6g Networks and Applications

Ai-Enabled 6g Networks and Applications

  • Ingram,出版日期:2022-12-27

This book includes review of AI techniques for 6G Networks and will focus on deployment of AI techniques to efficiently ......more

Network Science: Analysis and Optimization Algorithms for Real-World Applications

Network Science: Analysis and Optimization Algorithms for Real-World Applications

Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-b......more

Zeroing Neural Networks: Finite-Time Convergence Design, Analysis and Applications

Zeroing Neural Networks: Finite-Time Convergence Design, Analysis and Applications

This book presents zeroing neural network (ZNN) models with finite-time convergence in depth and comprehensiveness, incl......more

Streaming Analytics: Concepts, Architectures, Platforms, Use Cases and Applications

Streaming Analytics: Concepts, Architectures, Platforms, Use Cases and Applications

  • Ingram,出版日期:2022-11-26

When digitized entities, connected devices and microservices interact purposefully, we end up with a massive amount of m......more

Demystifying Graph Data Science: Graph Algorithms, Analytics Methods, Platforms, Databases, and Use Cases

Demystifying Graph Data Science: Graph Algorithms, Analytics Methods, Platforms, Databases, and Use Cases

  • Ingram,出版日期:2022-11-26

With the faster maturity and stability of digitization and edge technologies, zillions of digital entities, connected de......more

Nanoelectronics for Next-Generation Integrated Circuits

Nanoelectronics for Next-Generation Integrated Circuits

  • Ingram,出版日期:2022-11-25

The incessant scaling of complementary metal-oxide semiconductor (CMOS) technology has resulted in significant performan......more

Artificial Intelligence Perspective for Smart Cities

Artificial Intelligence Perspective for Smart Cities

  • Ingram,出版日期:2022-11-24

The concept of smart city is used widely in general however, it is hard to explain because of the complexity and multidi......more

Artificial Intelligence Perspective for Smart Cities

Artificial Intelligence Perspective for Smart Cities

  • Ingram,出版日期:2022-11-24

The concept of smart city is used widely in general however, it is hard to explain because of the complexity and multidi......more

Emerging Real-World Applications of Internet of Things

Emerging Real-World Applications of Internet of Things

  • Ingram,出版日期:2022-11-24

The Internet of Things (IoT) is a network of connected physical objects or things those are working along with sensors, ......more

Resistance to the Current: The Dialectics of Hacking

Resistance to the Current: The Dialectics of Hacking

How hacking cultures drive contemporary capitalism and the future of innovation. In Resistance to the Current, Johan Söd......more

What to Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century

What to Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century

This book teaches you everything that you need to know about preparing your company for a potential data breach. We begi......more

What to Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century

What to Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century

This book teaches you everything that you need to know about preparing your company for a potential data breach. We begi......more

AI and Machine Learning for Network and Security Management

AI and Machine Learning for Network and Security Management

Extensive Resource for Understanding Key Tasks of Network and Security Management AI and Machine Learning for Network an......more

Network Evolution and Applications

Network Evolution and Applications

Network Evolution and Applications provides a comprehensive, integrative and easy to understand the technologies, concep......more

Connected in Isolation: Digital Privilege in Unsettled Times

Connected in Isolation: Digital Privilege in Unsettled Times

What life during lockdown reveals about digital inequality. The vast majority of people in wealthy, highly connected, or......more

MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam Az-500

MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam Az-500

Prepare to take the NEW Exam AZ-500 with confidence and launch your career as an Azure Security Engineer Not only does M......more

Securing Small Networks

Securing Small Networks

...more

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

The 21st century has been the host to a number of information systems technologies in the area of science, automotive, a......more

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

The 21st century has been the host to a number of information systems technologies in the area of science, automotive, a......more

The Internet of Drones: AI Applications for Smart Solutions

The Internet of Drones: AI Applications for Smart Solutions

  • Ingram,出版日期:2022-11-03

In recent years, drones have been integrated with the Internet of Things to offer a variety of exciting new applications......more

Blockchains: Empowering Technologies and Industrial Applications

Blockchains: Empowering Technologies and Industrial Applications

  • Ingram,出版日期:2022-11-01

A comprehensive guide to the most recent developments in blockchains in theoretical and industrial perspectives Original......more

Learning Devsecops: Integrating Continuous Security Across Your Organization

Learning Devsecops: Integrating Continuous Security Across Your Organization

Learn how to implement continuous security throughout your entire software development and delivery pipeline. With this ......more

(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests

(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests

The CCSP Official (ISC)2 Practice Tests is a vital resource for CCSP candidates, providing more than 1000 unique practic......more

Ccsp (Isc)2 Certified Cloud Security Professional Official Study Guide & Practice Tests, 3e Bundle

Ccsp (Isc)2 Certified Cloud Security Professional Official Study Guide & Practice Tests, 3e Bundle

This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)2 Certified......more

Making Sense of Cyber Security

Making Sense of Cyber Security

...more

Oral Histories of the Internet and the Web

Oral Histories of the Internet and the Web

  • Ingram,出版日期:2022-10-25

...more

Cisco Cloud Infrastructure
Cyber Security Applications for Industry 4.0

Cyber Security Applications for Industry 4.0

  • Ingram,出版日期:2022-10-20

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer ......more

Secure Public Key Infrastructure: Standards, Pgp And Beyond

Secure Public Key Infrastructure: Standards, Pgp And Beyond

Designed for practitioners and researchers in industry, this wide-ranging handbook provides a professional-level examina......more

Security Technologies and Social Implications

Security Technologies and Social Implications

  • Ingram,出版日期:2022-10-18

Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime......more

How to Hack Like a Legend

How to Hack Like a Legend

Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their......more

Semantic Web Technologies: Research and Applications

Semantic Web Technologies: Research and Applications

  • Ingram,出版日期:2022-10-17

Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and expl......more

Cybersecurity: An Introduction

Cybersecurity: An Introduction

Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous example......more

Wandering Games

Wandering Games

An analysis of wandering within different game worlds, viewed through the lenses of work, colonialism, gender, and death......more

Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way

Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way

Among the many configuration management tools available, Ansible has some distinct advantages--it’s minimal in nature, y......more

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

Project Zero Trust puts readers into the driver’s seat in a journey to transform the security of a recently breached fic......more

Harnessing the Internet of Things (Iot) for a Hyper-Connected Smart World

Harnessing the Internet of Things (Iot) for a Hyper-Connected Smart World

  • Ingram,出版日期:2022-10-03

Harnessing the Internet of Things (IoT) for Hyper-Connected Smart World explores a multitude of diverse IoT applications......more

Machine Learning, Blockchain Technologies and Big Data Analytics for Iots: Methods, Technologies and Applications

Machine Learning, Blockchain Technologies and Big Data Analytics for Iots: Methods, Technologies and Applications

  • Ingram,出版日期:2022-09-26

Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, ......more

Network Security

Network Security

With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks d......more

Cisco Data Center Fundamentals
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation

Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation

This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology syst......more

Computing and Communications Engineering in Real-Time Application Development

Computing and Communications Engineering in Real-Time Application Development

  • Ingram,出版日期:2022-09-22

This book covers a selection of diverse aspects of recent trends and state-of-the art solutions in computer and communic......more

Nginx Cookbook: Advanced Recipes for High-Performance Load Balancing

Nginx Cookbook: Advanced Recipes for High-Performance Load Balancing

NGINX is one of the most widely used web servers available today, in part because of its capabilities as a load balancer......more

Ultra-Dense Heterogeneous Networks

Ultra-Dense Heterogeneous Networks

Driven by the ever-increasing amount of mobile data, cellular networks evolve from small cell network to ultra-dense het......more

Cloud Iot: Concepts, Paradigms, and Applications

Cloud Iot: Concepts, Paradigms, and Applications

  • Ingram,出版日期:2022-09-12

The Internet of Things (IoT) is one of the most disruptive technologies, enabling ubiquitous and pervasive computing sce......more

Advanced Circuits and Systems for Healthcare and Security Applications

Advanced Circuits and Systems for Healthcare and Security Applications

  • Ingram,出版日期:2022-09-08

VLSI devices down scaling is a very significant part of the design to improve the performance of VLSI industry outcomes,......more

Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, Nfts, and Smart Contracts

Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, Nfts, and Smart Contracts

The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing a......more

Casp+ Certification Kit: Exam Cas-004

Casp+ Certification Kit: Exam Cas-004

Prepare for test success with this all-in-one CASP+ Certification Kit! The kit includes: CASP+ Study Guide: Exam CAS-004......more

Networks Rising: Thinking Together in a Connected World

Networks Rising: Thinking Together in a Connected World

For the second time in human history, we are on the verge of a great leap forward in health, productivity, and personal ......more

Let’s Get Iot-Fied!: 30 Iot Projects for All Levels

Let’s Get Iot-Fied!: 30 Iot Projects for All Levels

This book teaches readers how to build IoT products through practical projects, ranging from beginners to advanced level......more

Let’s Get Iot-Fied!: 30 Iot Projects for All Levels

Let’s Get Iot-Fied!: 30 Iot Projects for All Levels

This book teaches readers how to build IoT products through practical projects, ranging from beginners to advanced level......more

Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams

Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams

  • Ingram,出版日期:2022-09-01

IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand wh......more

Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams

Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams

IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand wh......more

Cyber Security Threats and Challenges Facing Human Life

Cyber Security Threats and Challenges Facing Human Life

  • Ingram,出版日期:2022-09-01

Cyber Security Threats and Challenges: A Comprehensive Coverage proposes to provide a comprehensive view of the issues, ......more

2001 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類