客服公告:反詐騙!不碰ATM、網銀、不說信用卡,認證藍勾勾FB粉絲頁詳情

排序依

共有22843

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era

An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more

Digital Suffragists: Women, the Web, and the Future of Democracy

Digital Suffragists: Women, the Web, and the Future of Democracy

Why women’s voices are outnumbered online and what we can do about it, by a New York Times comment moderator. If you’ve ......more

Safeguarding Adults Online: A Guide for Social Workers

Safeguarding Adults Online: A Guide for Social Workers

Though the Internet offers benefits such as connectivity, easily available knowledge, and diverse entertainment, digital......more

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies

As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement a......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Aws Certified Security Study Guide: Specialty (Scs-C02) Exam

Aws Certified Security Study Guide: Specialty (Scs-C02) Exam

A practical and comprehensive guide to the AWS Certified Security exam and your next AWS cloud security job In the newly......more

Machine Learning for Malware Detection

Machine Learning for Malware Detection

  • Ingram,出版日期:2025-10-30

Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more

Decentralized Optimization in Networks: Algorithmic Efficiency and Privacy Preservation

Decentralized Optimization in Networks: Algorithmic Efficiency and Privacy Preservation

Decentralized algorithms are useful for solving large-scale complex optimization problems, which not only alleviate the ......more

The Physics of Wireless Communications

The Physics of Wireless Communications

Understand the technology that has reshaped global communication. Wireless communication has transformed virtually every......more

Smart Electric Power: Integrating Power with Information for Smarter Cities

Smart Electric Power: Integrating Power with Information for Smarter Cities

Explore foundational and advanced topics in smart electric power in the context of smart cities In Smart Electric Power:......more

Listen and Repair: A Guide for Information Security to Meet Future Demands

Listen and Repair: A Guide for Information Security to Meet Future Demands

An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more

Internet-Ontologies-Things: Smart Objects, Hidden Problems, and Their Symmetries

Internet-Ontologies-Things: Smart Objects, Hidden Problems, and Their Symmetries

Internet-ontologies-Things explores how power mobilizes algorithmic and ontological objects, for example smartwatches an......more

Autonomous Cyber Resilience

Autonomous Cyber Resilience

  • Ingram,出版日期:2025-05-13

Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any......more

Linux Basics for Hackers, 2nd Edition

Linux Basics for Hackers, 2nd Edition

The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers ha......more

Security: A Systems Engineering Approach

Security: A Systems Engineering Approach

Discover the vital role system engineers play in creating system and cyber security In an increasingly connected and inc......more

Securing Cloud Native Apps

Securing Cloud Native Apps

A no-fluff guide to implementing best practices for securing cloud native services. What are the best practices to secur......more

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

In an era where cybersecurity threats are escalating and complex global regulations are intensifying, the need for a com......more

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

In an era where cybersecurity threats are escalating and complex global regulations are intensifying, the need for a com......more

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Cca Cisco Certified Associate Devnet Study Guide: Exam 200-901

Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more

Network Coding for Engineers

Network Coding for Engineers

Understand the fundamentals of network coding from an engineering perspective with this accessible guide Network Coding ......more

Personal Threat Management: The Practitioner’s Guide to Keeping Clients Safer

Personal Threat Management: The Practitioner’s Guide to Keeping Clients Safer

Often, the loudest threats are not the most dangerous. Discover a more intelligent way to assess and manage personal saf......more

Personal Threat Management: The Practitioner’s Guide to Keeping Clients Safer

Personal Threat Management: The Practitioner’s Guide to Keeping Clients Safer

Often, the loudest threats are not the most dangerous. Discover a more intelligent way to assess and manage personal saf......more

Securing Microsoft Azure OpenAI

Securing Microsoft Azure OpenAI

Unlock the power of AI while ensuring your data security and customer privacy In Securing Microsoft Azure OpenAI, author......more

Cisa Study Guide

Cisa Study Guide

Prepare for success on the 2024 CISA exam and further your career in security and audit with this effective study guide ......more

Mobile Multimedia Communications: 16th Eai International Conference, Mobimedia 2023, Guilin, China, July 22-24, 2023, Proceedings

Mobile Multimedia Communications: 16th Eai International Conference, Mobimedia 2023, Guilin, China, July 22-24, 2023, Proceedings

  • Ingram,出版日期:2025-01-07

This proceedings constitutes the referred post-conference proceedings of the 16th International Conference on Mobile Mul......more

Mobile Communication Systems for Private Networks

Mobile Communication Systems for Private Networks

Understand the role of network communications in the private sector with this timely guide 4G and 5G wireless communicat......more

Smart Cyber-Physical Power Systems: Challenges and Solutions

Smart Cyber-Physical Power Systems: Challenges and Solutions

  • Ingram,出版日期:2025-01-02

Authoritative and highly comprehensive guide on how emerging technologies can address various challenges in different se......more

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic Networking: Models, Protocols, and Applications

Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many......more

Machine Learning for Wireless Communications and Networking: An Introduction

Machine Learning for Wireless Communications and Networking: An Introduction

Machine Learning for Wireless Communications and Networking: An Introduction provides an easy-to-understand introduction......more

Professional Penetration Testing: Creating and Learning in a Hacking Lab

Professional Penetration Testing: Creating and Learning in a Hacking Lab

Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the ent......more

Resource Allocation in Wireless Communications: Fundamentals, Algorithms and Applications

Resource Allocation in Wireless Communications: Fundamentals, Algorithms and Applications

Resource-Allocation in Wireless Communications: Fundamentals, Algorithms and Applications gives an easy- to-understand o......more

CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam

CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam

The ideal prep guide for earning your CCST Cybersecurity certification CCST Cisco Certified Support Technician Study Gui......more

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more

The Use of Information and Communication Technologies (Ict) in the Management of the Innovative and Smart City

The Use of Information and Communication Technologies (Ict) in the Management of the Innovative and Smart City

  • Ingram,出版日期:2024-12-24

A key element in the formation of smart cities is development based on cooperation between local governments and busines......more

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more

Cybersecurity and Data Science Innovations for Sustainable Development of Heicc: Healthcare, Education, Industry, Cities and Communities

Cybersecurity and Data Science Innovations for Sustainable Development of Heicc: Healthcare, Education, Industry, Cities and Communities

  • Ingram,出版日期:2024-12-24

Cyber Security and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Citie......more

Networking All-In-One for Dummies

Networking All-In-One for Dummies

The essentials you need to learn about networking--10 books in one! With over 900 pages of clear and trustworthy informa......more

Artificial Intelligence and Iot for Cyber Security Solutions in Smart Cities

Artificial Intelligence and Iot for Cyber Security Solutions in Smart Cities

  • Ingram,出版日期:2024-12-24

This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and ......more

A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice

A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice

Learn to enhance your organizations cybersecurity through the NIST Cybersecurity Framework in this invaluable and access......more

Principle & Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain

Principle & Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain

Technical theory, key technologies, and practical applications for consortium blockchains, with a solution to the CAP tr......more

Software-Defined Networking and Artificial Intelligence: Core Concepts, Emerging Trends, and Practical Applications

Software-Defined Networking and Artificial Intelligence: Core Concepts, Emerging Trends, and Practical Applications

  • Ingram,出版日期:2024-12-17

we think about and manage networks. In today’s digital age, where connectivity is the lifeblood of our society, SDN has ......more

Agile Security in the Digital Era: Challenges and Cybersecurity Trends

Agile Security in the Digital Era: Challenges and Cybersecurity Trends

  • Ingram,出版日期:2024-12-16

In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Tren......more

Protecting Location Privacy in the Era of Big Data: A Technical Perspective

Protecting Location Privacy in the Era of Big Data: A Technical Perspective

This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focu......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain ......more

Emerging Electronics and Automation: Select Proceedings of the 3rd International Conference, E2a 2023, Volume 2

Emerging Electronics and Automation: Select Proceedings of the 3rd International Conference, E2a 2023, Volume 2

  • Ingram,出版日期:2024-12-03

This book includes peer-reviewed papers presented at the 3rd International Conference on Emerging Electronics & Automati......more

The Digital Doctor: How Digital Health Can Transform Healthcare

The Digital Doctor: How Digital Health Can Transform Healthcare

  • Ingram,出版日期:2024-12-01

According to the World Health Organization, digital health is a rapidly advancing science which is becoming increasingly......more

The Core Network for 5g Advanced

The Core Network for 5g Advanced

The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network f......more

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

  • Ingram,出版日期:2024-12-01

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies p......more

Big Data and Blockchain Technology for Secure Iot Applications

Big Data and Blockchain Technology for Secure Iot Applications

  • Ingram,出版日期:2024-11-27

Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more

Windows 11 in Easy Steps: Covers the Windows 11 2024 Update

Windows 11 in Easy Steps: Covers the Windows 11 2024 Update

Windows 11 in easy steps, 2nd edition guides you through discovering the key features and functions of Windows 11. In co......more

Holding Television Accountable: Essays on Audience Demands in the Social Media Age

Holding Television Accountable: Essays on Audience Demands in the Social Media Age

  • Ingram,出版日期:2024-11-24

This work discusses the impact of television show audience participation and expectations in the age of social media thr......more

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and desc......more

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and desc......more

Leveraging Artificial Intelligence (Ai) Competencies for Next-Generation Cybersecurity Solutions

Leveraging Artificial Intelligence (Ai) Competencies for Next-Generation Cybersecurity Solutions

  • Ingram,出版日期:2024-11-22

Modern enterprises are facing growing cybersecurity issues due to the massive volume of security-related data they gener......more

Dynamical Behaviors of Multiweighted Complex Network Systems

Dynamical Behaviors of Multiweighted Complex Network Systems

"Recently, numerous researchers have turned their attention to the dynamical behaviors of complex dynamical networks (CD......more

Hybrid Communication Systems for Future 6g and Beyond: Visible Light Communication and Radio Over Fiber Technology

Hybrid Communication Systems for Future 6g and Beyond: Visible Light Communication and Radio Over Fiber Technology

Comprehensive guide to hybrid communication systems using visible light communication, radio over fiber, and auto channe......more

Metasploit, 2nd Edition

Metasploit, 2nd Edition

The new and improved guide to penetration testing using the legendary Metasploit Framework. The Metasploit Framework mak......more

Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons

Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons

  • Ingram,出版日期:2024-11-19

Although recent advances in technology have made life easier for individuals, societies and states, they have also led t......more

Leveraging Blockchain Technology: Governance, Risk, Compliance, Security, and Benevolent Use Cases

Leveraging Blockchain Technology: Governance, Risk, Compliance, Security, and Benevolent Use Cases

  • Ingram,出版日期:2024-11-12

Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It i......more

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Internal Auditing

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Internal Auditing

In The Closing of the Auditor’s Mind? David J. O’Regan describes internal auditing as an important "binding agent" of so......more

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Virtue, Trust, and Wisdom in Modern Auditing

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Virtue, Trust, and Wisdom in Modern Auditing

In The Closing of the Auditor’s Mind? David J. O’Regan describes internal auditing as an important "binding agent" of so......more

Secure Health: A Guide to Cybersecurity for Healthcare Managers

Secure Health: A Guide to Cybersecurity for Healthcare Managers

  • Ingram,出版日期:2024-11-06

In today’s interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient ......more

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more

Proceedings of Iemtronics 2024: International Iot, Electronics and Mechatronics Conference, Volume 2

Proceedings of Iemtronics 2024: International Iot, Electronics and Mechatronics Conference, Volume 2

  • Ingram,出版日期:2024-11-03

This book gathers selected research papers presented at IEMTRONICS 2024 (International IoT, Electronics and Mechatronics......more

Theorising and Designing Immersive Environments: Enchanting Spaces

Theorising and Designing Immersive Environments: Enchanting Spaces

  • Ingram,出版日期:2024-11-03

This edited volume discusses the topic of immersion, approaching it from the perspective of various media and stakeholde......more

Guide to Srv6 Network Deployment

Guide to Srv6 Network Deployment

  • Ingram,出版日期:2024-11-01

This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple......more

The Ciso Playbook

The Ciso Playbook

A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more

The Ciso Playbook

The Ciso Playbook

A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more

Machine Learning for Low-Latency Communications

Machine Learning for Low-Latency Communications

Machine Learning for Low-Latency Communications presents the principles and practice of various deep learning methodolog......more

2291 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類