客服公告:2026年春節期間各項服務說明。詳情

排序依

共有25481

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

The Handbook of Data & Networks Security

The Handbook of Data & Networks Security

The Handbook of Data & Networks Security builds on the information and expertise conveyed in the existing Handbook of Da......more

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more

Metaverse and Blockchain Use Cases and Applications

Metaverse and Blockchain Use Cases and Applications

  • Ingram,出版日期:2027-07-01

Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more

Cybersecurity for the Enterprise: How to Design a Security Policy with Evidence-Based Methods

Cybersecurity for the Enterprise: How to Design a Security Policy with Evidence-Based Methods

Take an evidence-based approach to cybersecurity control design A call to action for enterprises to demand a modern, dat......more

Cybersecurity Controls: Design, Implement and Audit to Protect Your Organization

Cybersecurity Controls: Design, Implement and Audit to Protect Your Organization

Build and audit cybersecurity controls to better protect your organization from damaging cyber attacks. Cybersecurity Co......more

Cybersecurity Controls: Design, Implement and Audit to Protect Your Organization

Cybersecurity Controls: Design, Implement and Audit to Protect Your Organization

Build and audit cybersecurity controls to better protect your organization from damaging cyber attacks. Cybersecurity Co......more

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more

Artport: 2001-2026

Artport: 2001-2026

A close look at the history and evolution of digital art though the Whitney’s pioneering role in the field In the age of......more

Machine Learning for Malware Detection

Machine Learning for Malware Detection

  • Ingram,出版日期:2026-11-01

Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more

Data Protection Explained: How to Protect Data and Embed Privacy in Your Organization

Data Protection Explained: How to Protect Data and Embed Privacy in Your Organization

Strengthen data protection, reduce enterprise risk and deliver confident, compliant decision making across your organiza......more

Enterprise Penetration Testing

Enterprise Penetration Testing

A comprehensive, real-world guide to planning, executing, and leading professional penetration tests in large, complex e......more

Data Protection Explained: How to Protect Data and Embed Privacy in Your Organization

Data Protection Explained: How to Protect Data and Embed Privacy in Your Organization

Strengthen data protection, reduce enterprise risk and deliver confident, compliant decision making across your organiza......more

Cybersecurity Culture: Using Behavioural Science to Protect Your Organization

Cybersecurity Culture: Using Behavioural Science to Protect Your Organization

How can senior leaders ensure cybersecurity delivers resilience, ROI and lasting impact? Cybersecurity Culture is a prov......more

Cybersecurity Culture: Using Behavioural Science to Protect Your Organization

Cybersecurity Culture: Using Behavioural Science to Protect Your Organization

How can senior leaders ensure cybersecurity delivers resilience, ROI and lasting impact? Cybersecurity Culture is a prov......more

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more

Ten Modern Cryptographic Algorithms

Ten Modern Cryptographic Algorithms

A clear introduction to ten landmark cryptographic algorithms that shaped modern secure communication. Ten Modern Crypto......more

Building a Red Team

Building a Red Team

A practitioner-written guide to building, operating, and sustaining an effective red team inside real organizations--sho......more

Satellite Privacy: Connect vs. Track

Satellite Privacy: Connect vs. Track

Every scroll, every search, every journey you make could be silently observed from orbit. In an era defined by unprecede......more

This Is for Everyone: The Unfinished Story of the World Wide Web

This Is for Everyone: The Unfinished Story of the World Wide Web

A Sunday Times Bestseller The inventor of the World Wide Web explores his vision’s promise--and how it can be redeemed f......more

Red Team Tool Development: Building Custom Tools to Evade Modern Detection

Red Team Tool Development: Building Custom Tools to Evade Modern Detection

A practical, detection-aware guide to designing and building custom red team tools that survive in modern enterprise env......more

Designing User Interfaces for an Aging Population: Towards Universal Design

Designing User Interfaces for an Aging Population: Towards Universal Design

Designing User Interfaces for an Aging Population: Towards Universal Design, Second Edition explores the unique needs of......more

Decoding Cybersecurity: A Comprehensive Guide for the Non-Techie

Decoding Cybersecurity: A Comprehensive Guide for the Non-Techie

The imperative to defend against cyber threats is a fact of life in the digital age. World governments, Silicon Valley, ......more

Cyber Citizens: Saving Democracy with Digital Literacy

Cyber Citizens: Saving Democracy with Digital Literacy

A grounding exploration of how our online prowess shapes the very essence of democracy. The electronic age compels us to......more

The Model of Open Cooperativism

The Model of Open Cooperativism

This book explores the transformative role of open-source technologies and digital commons in fostering a cooperative an......more

Exploring Neurodiversity Through Virtual Reality: Breaking Power Imbalances in Experimental Research

Exploring Neurodiversity Through Virtual Reality: Breaking Power Imbalances in Experimental Research

This book explores how virtual reality (VR) can be used to examine perceptual differences in neurodivergent individuals,......more

The (Un)Natural History of Malware

The (Un)Natural History of Malware

An illustrated bestiary of malware creatures, drawn with charm and precision by a security professional. Discover the "(......more

Artificial Intelligence, Machine Learning and Blockchain in Digital Twin Computing

Artificial Intelligence, Machine Learning and Blockchain in Digital Twin Computing

  • Ingram,出版日期:2026-08-01

Digital twin computing is the bridge between the real and virtual worlds. Digital twin computing also is the mirror that......more

Improving Security and Energy Efficiency in Iot Networks: A Practical Guide

Improving Security and Energy Efficiency in Iot Networks: A Practical Guide

A practical guide to designing secure and energy-efficient IoT networks through cross-layer frameworks, lightweight cryp......more

Digital Storytelling: A Creators Guide to Interactive Entertainment, Volume II

Digital Storytelling: A Creators Guide to Interactive Entertainment, Volume II

Digital Storytelling: A Creator’s Guide to Interactive Entertainment, Volume 2, 5th edition, explores current developmen......more

Digital Storytelling: A Creators Guide to Interactive Entertainment, Volume II

Digital Storytelling: A Creators Guide to Interactive Entertainment, Volume II

Digital Storytelling: A Creator’s Guide to Interactive Entertainment, Volume 2, 5th edition, explores current developmen......more

Red Teaming AI: A Field Manual for Attacking Intelligent Systems

Red Teaming AI: A Field Manual for Attacking Intelligent Systems

AI is no longer a futuristic concept--it’s embedded in critical systems shaping finance, healthcare, infrastructure, and......more

Securing Cloud Native Apps

Securing Cloud Native Apps

A no-fluff guide to implementing best security practices for microservices in the cloud written by a team of experienced......more

Green Energy Driven Integrated Smart Grid and Wireless Networks.

Green Energy Driven Integrated Smart Grid and Wireless Networks.

This book outlines the design of green energy driven, integrated smart grid and wireless networks. It also explores the ......more

Advancements in Artificial Intelligence and Machine Learning: Proceedings of Ercicam 2025, Volume 2

Advancements in Artificial Intelligence and Machine Learning: Proceedings of Ercicam 2025, Volume 2

  • Ingram,出版日期:2026-07-22

This volume presents the proceedings of the International Conference on Emerging Research in Computing, Information, Com......more

An Introduction to Virtual and Augmented Reality: Designing Impactful Experiences

An Introduction to Virtual and Augmented Reality: Designing Impactful Experiences

This book is an introduction to Virtual Reality (VR) and Augmented Reality (AR), that will give learners a deep understa......more

An Introduction to Virtual and Augmented Reality: Designing Impactful Experiences

An Introduction to Virtual and Augmented Reality: Designing Impactful Experiences

This book is an introduction to Virtual Reality (VR) and Augmented Reality (AR), that will give learners a deep understa......more

Security Standardisation Research: 10th International Conference, Ssr 2025, Passau, Germany, December 4-5, 2025, Proceedings

Security Standardisation Research: 10th International Conference, Ssr 2025, Passau, Germany, December 4-5, 2025, Proceedings

  • Ingram,出版日期:2026-07-09

This book constitutes the refereed proceedings of the 10th International Conference on Security Standardisation Research......more

The Smartphone Solution: When and How to Give Your Child a Phone

The Smartphone Solution: When and How to Give Your Child a Phone

The Essential Self-Help Guide to Your Children Thriving in a Digital Age from Clinical Psychologist and Bestselling Auth......more

Multimodal Knowledge Systems: Construction and Reasoning

Multimodal Knowledge Systems: Construction and Reasoning

This book focuses on advancing the integration of multimodal data (text, images, and structured knowledge) to enable pre......more

Delay Doppler Communications and Sensing: Principles, Advances and Applications of Otfs

Delay Doppler Communications and Sensing: Principles, Advances and Applications of Otfs

Delay Doppler Communications and Sensing: Principles, Advances and Applications of OTFS provides a comprehensive explora......more

Certified Cloud Security Professional (Ccsp) Study Guide: Cloud Security for Everyone

Certified Cloud Security Professional (Ccsp) Study Guide: Cloud Security for Everyone

Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand ......more

Trust Hacked: What Firewalls, Failures, and the Frontlines Taught Me about Trust

Trust Hacked: What Firewalls, Failures, and the Frontlines Taught Me about Trust

Trust Hacked by Nia Luckey redefines leadership for the digital age, framing trust not as a soft skill but as critical i......more

Trust Hacked: What Firewalls, Failures, and the Frontlines Taught Me about Trust

Trust Hacked: What Firewalls, Failures, and the Frontlines Taught Me about Trust

Trust Hacked by Nia Luckey redefines leadership for the digital age, framing trust not as a soft skill but as critical i......more

Towards the Era of Autonomous Network: IP Autonomous Driving Network

Towards the Era of Autonomous Network: IP Autonomous Driving Network

  • Ingram,出版日期:2026-06-24

This book examines IP autonomous driving network (ADN) technology and solutions, offering insights into the challenges t......more

Digital Equity Ecosystems: How Community Coalitions Reduce Inequality and Strengthen Democracy

Digital Equity Ecosystems: How Community Coalitions Reduce Inequality and Strengthen Democracy

Digital Equity Ecosystems introduces readers to the groundswell of community coalitions that work to alleviate technolog......more

Digital Equity Ecosystems: How Community Coalitions Reduce Inequality and Strengthen Democracy

Digital Equity Ecosystems: How Community Coalitions Reduce Inequality and Strengthen Democracy

Digital Equity Ecosystems introduces readers to the groundswell of community coalitions that work to alleviate technolog......more

Practical Fuzzing

Practical Fuzzing

A hands-on, from-first-principles guide to building a modern, research-grade fuzzer you fully understand and control. Wr......more

Cybersecurity and the Art of Cyberwar

Cybersecurity and the Art of Cyberwar

The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is a......more

Cybersecurity and the Art of Cyberwar

Cybersecurity and the Art of Cyberwar

The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is a......more

Dark Faces in Cyber Places: Shattering Stereotypes and Leading with Legacy in Cybersecurity

Dark Faces in Cyber Places: Shattering Stereotypes and Leading with Legacy in Cybersecurity

In an industry that often lacks representation, "Dark Faces in Cyber Places" shines a bright spotlight on the remarkable......more

Dark Faces in Cyber Places: Shattering Stereotypes and Leading with Legacy in Cybersecurity

Dark Faces in Cyber Places: Shattering Stereotypes and Leading with Legacy in Cybersecurity

In an industry that often lacks representation, "Dark Faces in Cyber Places" shines a bright spotlight on the remarkable......more

Genai Security: Secure Chatbots and Agent Systems

Genai Security: Secure Chatbots and Agent Systems

This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides......more

Genai Security: Secure Chatbots and Agent Systems

Genai Security: Secure Chatbots and Agent Systems

This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides......more

5 Habits of the Tech-Ready Family: Raising Wise Kids in a Wild Digital World

5 Habits of the Tech-Ready Family: Raising Wise Kids in a Wild Digital World

With just five simple habits, you can shape an environment where your kids grow confident, resilient, and ready to face ......more

Security Strategy of Intelligent Transport’s Telematic Systems

Security Strategy of Intelligent Transport’s Telematic Systems

The book "Safety Strategy for Intelligent Transport Telematics Systems" is a monograph devoted to one of the key challen......more

Generative AI for Cybersecurity

Generative AI for Cybersecurity

  • Ingram,出版日期:2026-06-15

Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As......more

Heavy Wizardry 101: Shellcodes, Backdoors, Droppers, and Worms

Heavy Wizardry 101: Shellcodes, Backdoors, Droppers, and Worms

Aspiring hackers will learn foundational programming in C and assembly languages from a veteran hacker and develop the s......more

Software-Defined Networking for Iot Systems: Architecture, Integration, and Applications

Software-Defined Networking for Iot Systems: Architecture, Integration, and Applications

Software-Defined Networking for IoT Systems: Architecture, Integration, and Applications is a cutting-edge guide that br......more

Software-Defined Networking for Iot Systems: Architecture, Integration, and Applications

Software-Defined Networking for Iot Systems: Architecture, Integration, and Applications

Software-Defined Networking for IoT Systems: Architecture, Integration, and Applications is a cutting-edge guide that br......more

AI and Blockchain for Wireless Communications: Creating Resilient and Secure Systems

AI and Blockchain for Wireless Communications: Creating Resilient and Secure Systems

  • Ingram,出版日期:2026-06-01

AI and Blockchain for Wireless Communications: Creating Resilient and Secure Systems describes the merger of AI and bloc......more

Securing Generative Ai, Llms, and ML Using Zero Trust Architecture

Securing Generative Ai, Llms, and ML Using Zero Trust Architecture

Securing AI Using Zero Trust Principles Strategic Guidance for Defending AI Systems in a Rapidly Evolving Threat Landsca......more

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

  • Ingram,出版日期:2026-05-28

The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

  • Ingram,出版日期:2026-05-28

The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more

Digital Twin Technology in Geospatial Science: Trends, Applications and Challenges

Digital Twin Technology in Geospatial Science: Trends, Applications and Challenges

  • Ingram,出版日期:2026-05-28

This book explores utilization of digital twin technology and geospatial science for the digital transformation of urban......more

Technology Governance: Build Trust in Digital Innovation

Technology Governance: Build Trust in Digital Innovation

Making the right decisions about emerging technology is a challenge for every business. It requires senior leaders to ba......more

Technology Governance: Build Trust in Digital Innovation

Technology Governance: Build Trust in Digital Innovation

Making the right decisions about emerging technology is a challenge for every business. It requires senior leaders to ba......more

Become Isc2 Certified in Cybersecurity: Everything You Need to Get the Certification

Become Isc2 Certified in Cybersecurity: Everything You Need to Get the Certification

Get a free eBook (PDF or ePub) from Manning as well as access to the online liveBook format (and its AI assistant that w......more

Audio Spoof Detection from Theory to Practical Application

Audio Spoof Detection from Theory to Practical Application

Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulat......more

Audio Spoof Detection from Theory to Practical Application

Audio Spoof Detection from Theory to Practical Application

Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulat......more

Foundations of Cybersecurity, 2nd Edition: A Straightforward Introduction

Foundations of Cybersecurity, 2nd Edition: A Straightforward Introduction

This comprehensive introduction to the information security field covers the industry’s essential concepts, using real-w......more

Internet of Things and Its Applications: Select Proceedings of Icia 2024

Internet of Things and Its Applications: Select Proceedings of Icia 2024

  • Ingram,出版日期:2026-05-15

This volume comprises selected papers presented at the International Conference on IoT and Its Applications 2024. The re......more

Federated Learning in Finance: Unlocking Privacy-Preserving and Cyber Resilience Using AI

Federated Learning in Finance: Unlocking Privacy-Preserving and Cyber Resilience Using AI

  • Ingram,出版日期:2026-05-13

Federated Intelligence: Unlocking Privacy-Preserving and Cyber Resilience using AI in the Finance Industry" is an edited......more

Iapp Aigp Artificial Intelligence Governance Professional Study Guide

Iapp Aigp Artificial Intelligence Governance Professional Study Guide

An accurate and up-to-date guide to success on the AIGP certification exam and an essential resource for technology and ......more

Research Advances in Network Technologies: Volume 3

Research Advances in Network Technologies: Volume 3

  • Ingram,出版日期:2026-05-12

In the digital age, information is the most vital asset and network technologies are the invisible threads that connect ......more

2551 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類