排序依

共有23981

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

The Handbook of Data & Networks Security

The Handbook of Data & Networks Security

The Handbook of Data & Networks Security builds on the information and expertise conveyed in the existing Handbook of Da......more

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more

Metaverse and Blockchain Use Cases and Applications

Metaverse and Blockchain Use Cases and Applications

  • Ingram,出版日期:2027-07-01

Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more

Cybersecurity for the Enterprise: How to Design a Security Policy with Evidence-Based Methods

Cybersecurity for the Enterprise: How to Design a Security Policy with Evidence-Based Methods

Take an evidence-based approach to cybersecurity control design A call to action for enterprises to demand a modern, dat......more

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more

Machine Learning for Malware Detection

Machine Learning for Malware Detection

  • Ingram,出版日期:2026-03-28

Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more

Securing Cloud Native Apps

Securing Cloud Native Apps

A no-fluff guide to implementing best security practices for microservices in the cloud written by a team of experienced......more

Digital Suffragists: Women, the Web, and the Future of Democracy

Digital Suffragists: Women, the Web, and the Future of Democracy

Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more

Safeguarding Adults Online: A Guide for Social Workers

Safeguarding Adults Online: A Guide for Social Workers

Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more

Autonomous Cyber Resilience

Autonomous Cyber Resilience

  • Ingram,出版日期:2026-01-21

Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any......more

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more

Tactile Internet for a Human-Centred Metaverse

Tactile Internet for a Human-Centred Metaverse

  • Ingram,出版日期:2026-01-01

Tactile Internet for a Human-Centred Metaverse is a groundbreaking, comprehensive guide to this innovative communication......more

Smart Electric Power: Integrating Power with Information for Smarter Cities

Smart Electric Power: Integrating Power with Information for Smarter Cities

Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more

The Model of Open Cooperativism

The Model of Open Cooperativism

This book explores the transformative role of open-source technologies and digital commons in fostering a cooperative an......more

Understanding Satellite Navigation

Understanding Satellite Navigation

Understanding Satellite Navigation, 2nd Edition explains the basic principles of satellite navigation technology with th......more

The Security of Self: A Human-Centric Approach to Cybersecurity

The Security of Self: A Human-Centric Approach to Cybersecurity

  • Ingram,出版日期:2025-11-25

Cybersecurity is often examined through the lens of national security and organizational risks, focusing on data breache......more

The Security of Self: A Human-Centric Approach to Cybersecurity

The Security of Self: A Human-Centric Approach to Cybersecurity

  • Ingram,出版日期:2025-11-25

Cybersecurity is often examined through the lens of national security and organizational risks, focusing on data breache......more

AI for Cybersecurity: Research and Practice

AI for Cybersecurity: Research and Practice

  • Ingram,出版日期:2025-11-19

Informative reference on the state of the art in cybersecurity and how to achieve a more secure cyberspace AI for Cybers......more

Advances in Fog Computing and the Internet of Things for Smart Healthcare

Advances in Fog Computing and the Internet of Things for Smart Healthcare

  • Ingram,出版日期:2025-11-19

The synergy between fog computing and the IoT facilitates the growth of smart applications and services, empowering vari......more

Dark Wire: The Incredible True Story of the Largest Sting Operation Ever

Dark Wire: The Incredible True Story of the Largest Sting Operation Ever

Written "in the manner of a good crime thriller" (The Wall Street Journal), the inside story of the largest law-enforcem......more

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolvin......more

Securing Cloud Containers: Building and Running Secure Cloud-Native Applications

Securing Cloud Containers: Building and Running Secure Cloud-Native Applications

A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure Securing Cloud Containers: Buildi......more

Ubuntu Linux Bible

Ubuntu Linux Bible

The latest version of the gold standard in Ubuntu Linux resources In the freshly updated eleventh edition of Ubuntu Linu......more

Powershell for Security Analysts

Powershell for Security Analysts

No experience with PowerShell? No problem! Learn how to leverage the versatile toolkit installed on every Windows comput......more

Hacking for Dummies

Hacking for Dummies

Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to u......more

Practical Purple Teaming: The Art of Collaborative Defense

Practical Purple Teaming: The Art of Collaborative Defense

This practical introduction to collaborative security testing, or "purple teaming," is a hands-on, lab-based guide to ke......more

Linux Bible

Linux Bible

The industry gold standard in Linux guides, fully updated In the newly updated eleventh edition of the Linux Bible, vete......more

Cyber Security in Business Analytics

Cyber Security in Business Analytics

  • Ingram,出版日期:2025-10-07

This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersec......more

Non-Terrestrial Networks: Paving the Way Towards Global Connectivity

Non-Terrestrial Networks: Paving the Way Towards Global Connectivity

  • Ingram,出版日期:2025-10-01

Non-Terrestrial Networks: Paving the Way Towards Global Connectivity presents technologies that are important for NTNs -......more

The Physics of Wireless Communications

The Physics of Wireless Communications

Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more

Comptia A+ Certmike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1201

Comptia A+ Certmike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1201

Skip the fluff and quickly master the essentials with this accurate CompTIA A+ certification test prep In the second edi......more

Comptia A+ Certmike: Prepare. Practice. Pass the Test! Get Certified!: Core 2 Exam 220-1202

Comptia A+ Certmike: Prepare. Practice. Pass the Test! Get Certified!: Core 2 Exam 220-1202

Skip the fluff and quickly master the essentials with this accurate CompTIA A+ certification test prep In the second edi......more

Fundamentals of Fog Computing and the Internet of Things for Smart Healthcare

Fundamentals of Fog Computing and the Internet of Things for Smart Healthcare

  • Ingram,出版日期:2025-09-17

Fundamentals of Fog Computing and the Internet of Things for Smart Healthcare explores the intersection of two transform......more

Traditional Vs Generative AI Pentesting: A Hands-On Approach to Hacking

Traditional Vs Generative AI Pentesting: A Hands-On Approach to Hacking

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration t......more

Traditional Vs Generative AI Pentesting: A Hands-On Approach to Hacking

Traditional Vs Generative AI Pentesting: A Hands-On Approach to Hacking

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration t......more

The Stack

The Stack

An accessible journey through the seam that connects the digital world of the Internet to our physical world. The stack-......more

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more

Metaverse in the Healthcare Industry: Potential Applications, Tools, and Techniques

Metaverse in the Healthcare Industry: Potential Applications, Tools, and Techniques

  • Ingram,出版日期:2025-09-10

Metaverse in the Healthcare Industry: Potential Applications, Tools, and Techniques explores the intersection of rapidly......more

This Is for Everyone: The Unfinished Story of the World Wide Web

This Is for Everyone: The Unfinished Story of the World Wide Web

The inventor of the World Wide Web explores his vision’s promise--and how it can be redeemed for the future. Perhaps the......more

Cyber Defense: Best Practices for Digital Safety

Cyber Defense: Best Practices for Digital Safety

Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and mainta......more

Wireshark Essentials: Simplifying Network Security and Troubleshooting

Wireshark Essentials: Simplifying Network Security and Troubleshooting

Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysi......more

The Definitive Game Narrative Guide

The Definitive Game Narrative Guide

The Definitive Game Narrative Guide is the ultimate start and end point for storytelling in video games. Whether you’re ......more

Wireshark Essentials: Simplifying Network Security and Troubleshooting

Wireshark Essentials: Simplifying Network Security and Troubleshooting

Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysi......more

The Definitive Game Narrative Guide

The Definitive Game Narrative Guide

The Definitive Game Narrative Guide is the ultimate start and end point for storytelling in video games. Whether you’re ......more

Learning API Styles: Understanding the Trade-Offs of Common APIs and Choosing the Correct Solutions

Learning API Styles: Understanding the Trade-Offs of Common APIs and Choosing the Correct Solutions

When developing a service, whether it’s a web service or a microservice, an application programming interface (API) is e......more

6g-Life: Unveiling the Future of Technological Sovereignty, Sustainability and Trustworthiness

6g-Life: Unveiling the Future of Technological Sovereignty, Sustainability and Trustworthiness

  • Ingram,出版日期:2025-09-01

6G-Life: Unveiling the Future of Technological Sovereignty, Sustainability and Trustworthiness, gives a journey into the......more

Guardians of the Digital Age: Securing the Future

Guardians of the Digital Age: Securing the Future

The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more

Guardians of the Digital Age: Securing the Future

Guardians of the Digital Age: Securing the Future

The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more

The Psychology of Cybersecurity: Hacking and the Human Mind

The Psychology of Cybersecurity: Hacking and the Human Mind

This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and IT management, discus......more

The Psychology of Cybersecurity: Hacking and the Human Mind

The Psychology of Cybersecurity: Hacking and the Human Mind

This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and IT management, discus......more

Onlife Criminology: Virtual Crimes and Real Harms

Onlife Criminology: Virtual Crimes and Real Harms

Digital tools such as smart devices, personal trackers and social media have become part of daily life for many. ’Onlife......more

Data Engineering for Cybersecurity

Data Engineering for Cybersecurity

Learn essential strategies to streamline and secure your organization’s data handling from a cybersecurity expert who ha......more

Cyber Security, Forensics and National Security

Cyber Security, Forensics and National Security

  • Ingram,出版日期:2025-08-25

The book serves two very important purposes. One the concept and vulnerabilities due to cyber attacks in all walks of li......more

Unlocked: The Real Science of Screen Time (and How to Spend It Better)

Unlocked: The Real Science of Screen Time (and How to Spend It Better)

’A welcome counterpoint to the technopanic that screen time is causing a mental health crisis’ Bruce Hood ’A rare mix of......more

From Day Zero to Zero Day

From Day Zero to Zero Day

Find security holes before the bad guys do. Break into the world of vulnerability research--or expand your cybersecurity......more

Metaverse and Blockchain Use Cases and Applications

Metaverse and Blockchain Use Cases and Applications

  • Ingram,出版日期:2025-08-12

Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more

A Practical Approach to Open Source Intelligence (Osint) - Volume 1

A Practical Approach to Open Source Intelligence (Osint) - Volume 1

This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast oce......more

A Practical Approach to Open Source Intelligence (Osint) - Volume 1

A Practical Approach to Open Source Intelligence (Osint) - Volume 1

This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast oce......more

Autonomous Urban Mobility: Understanding Adoption Parameters, Perceptions, Perspectives

Autonomous Urban Mobility: Understanding Adoption Parameters, Perceptions, Perspectives

This book delves into the complex landscape of autonomous urban mobility, analysing the factors that influence public ad......more

Autonomous Urban Mobility: Understanding Innovation Principles, Priorities, Policies

Autonomous Urban Mobility: Understanding Innovation Principles, Priorities, Policies

This book provides a comprehensive exploration of the rapidly evolving field of autonomous urban mobility, examining its......more

Autonomous Urban Mobility: Understanding Adoption Parameters, Perceptions, Perspectives

Autonomous Urban Mobility: Understanding Adoption Parameters, Perceptions, Perspectives

This book delves into the complex landscape of autonomous urban mobility, analysing the factors that influence public ad......more

Autonomous Urban Mobility: Understanding Innovation Principles, Priorities, Policies

Autonomous Urban Mobility: Understanding Innovation Principles, Priorities, Policies

This book provides a comprehensive exploration of the rapidly evolving field of autonomous urban mobility, examining its......more

2401 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類