客服公告:2026年春節期間各項服務說明。詳情
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
The Handbook of Data & Networks Security builds on the information and expertise conveyed in the existing Handbook of Da......more
...more
An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role ......more
Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more
Take an evidence-based approach to cybersecurity control design A call to action for enterprises to demand a modern, dat......more
...more
...more
Build and audit cybersecurity controls to better protect your organization from damaging cyber attacks. Cybersecurity Co......more
Build and audit cybersecurity controls to better protect your organization from damaging cyber attacks. Cybersecurity Co......more
Succeed on the CCA DevNet certification exam and take on a new or expanded role as a developer or network engineer In th......more
...more
...more
A close look at the history and evolution of digital art though the Whitney’s pioneering role in the field In the age of......more
Malware detection is exceedingly challenging, requiring deeper expertise in two domains: machine learning (ML) and malwa......more
Strengthen data protection, reduce enterprise risk and deliver confident, compliant decision making across your organiza......more
A comprehensive, real-world guide to planning, executing, and leading professional penetration tests in large, complex e......more
Strengthen data protection, reduce enterprise risk and deliver confident, compliant decision making across your organiza......more
How can senior leaders ensure cybersecurity delivers resilience, ROI and lasting impact? Cybersecurity Culture is a prov......more
How can senior leaders ensure cybersecurity delivers resilience, ROI and lasting impact? Cybersecurity Culture is a prov......more
How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more
How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more
...more
A clear introduction to ten landmark cryptographic algorithms that shaped modern secure communication. Ten Modern Crypto......more
A practitioner-written guide to building, operating, and sustaining an effective red team inside real organizations--sho......more
Every scroll, every search, every journey you make could be silently observed from orbit. In an era defined by unprecede......more
A Sunday Times Bestseller The inventor of the World Wide Web explores his vision’s promise--and how it can be redeemed f......more
A practical, detection-aware guide to designing and building custom red team tools that survive in modern enterprise env......more
Designing User Interfaces for an Aging Population: Towards Universal Design, Second Edition explores the unique needs of......more
The imperative to defend against cyber threats is a fact of life in the digital age. World governments, Silicon Valley, ......more
...more
A grounding exploration of how our online prowess shapes the very essence of democracy. The electronic age compels us to......more
This book explores the transformative role of open-source technologies and digital commons in fostering a cooperative an......more
This book explores how virtual reality (VR) can be used to examine perceptual differences in neurodivergent individuals,......more
...more
An illustrated bestiary of malware creatures, drawn with charm and precision by a security professional. Discover the "(......more
...more
Digital twin computing is the bridge between the real and virtual worlds. Digital twin computing also is the mirror that......more
A practical guide to designing secure and energy-efficient IoT networks through cross-layer frameworks, lightweight cryp......more
Digital Storytelling: A Creator’s Guide to Interactive Entertainment, Volume 2, 5th edition, explores current developmen......more
Digital Storytelling: A Creator’s Guide to Interactive Entertainment, Volume 2, 5th edition, explores current developmen......more
AI is no longer a futuristic concept--it’s embedded in critical systems shaping finance, healthcare, infrastructure, and......more
A no-fluff guide to implementing best security practices for microservices in the cloud written by a team of experienced......more
This book outlines the design of green energy driven, integrated smart grid and wireless networks. It also explores the ......more
This volume presents the proceedings of the International Conference on Emerging Research in Computing, Information, Com......more
...more
This book is an introduction to Virtual Reality (VR) and Augmented Reality (AR), that will give learners a deep understa......more
This book is an introduction to Virtual Reality (VR) and Augmented Reality (AR), that will give learners a deep understa......more
This book constitutes the refereed proceedings of the 10th International Conference on Security Standardisation Research......more
...more
The Essential Self-Help Guide to Your Children Thriving in a Digital Age from Clinical Psychologist and Bestselling Auth......more
This book focuses on advancing the integration of multimodal data (text, images, and structured knowledge) to enable pre......more
Delay Doppler Communications and Sensing: Principles, Advances and Applications of OTFS provides a comprehensive explora......more
Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand ......more
Trust Hacked by Nia Luckey redefines leadership for the digital age, framing trust not as a soft skill but as critical i......more
Trust Hacked by Nia Luckey redefines leadership for the digital age, framing trust not as a soft skill but as critical i......more
This book examines IP autonomous driving network (ADN) technology and solutions, offering insights into the challenges t......more
Digital Equity Ecosystems introduces readers to the groundswell of community coalitions that work to alleviate technolog......more
Digital Equity Ecosystems introduces readers to the groundswell of community coalitions that work to alleviate technolog......more
A hands-on, from-first-principles guide to building a modern, research-grade fuzzer you fully understand and control. Wr......more
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is a......more
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is a......more
In an industry that often lacks representation, "Dark Faces in Cyber Places" shines a bright spotlight on the remarkable......more
In an industry that often lacks representation, "Dark Faces in Cyber Places" shines a bright spotlight on the remarkable......more
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides......more
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides......more
Advanced Investigation Strategies for IoT Forensics: Technical Solutions to Security and Investigative Methodologies in ......more
With just five simple habits, you can shape an environment where your kids grow confident, resilient, and ready to face ......more
The book "Safety Strategy for Intelligent Transport Telematics Systems" is a monograph devoted to one of the key challen......more
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As......more
Aspiring hackers will learn foundational programming in C and assembly languages from a veteran hacker and develop the s......more
Software-Defined Networking for IoT Systems: Architecture, Integration, and Applications is a cutting-edge guide that br......more
Software-Defined Networking for IoT Systems: Architecture, Integration, and Applications is a cutting-edge guide that br......more
AI and Blockchain for Wireless Communications: Creating Resilient and Secure Systems describes the merger of AI and bloc......more
Securing AI Using Zero Trust Principles Strategic Guidance for Defending AI Systems in a Rapidly Evolving Threat Landsca......more
...more
...more
...more
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more
This book explores utilization of digital twin technology and geospatial science for the digital transformation of urban......more
Making the right decisions about emerging technology is a challenge for every business. It requires senior leaders to ba......more
Making the right decisions about emerging technology is a challenge for every business. It requires senior leaders to ba......more
Get a free eBook (PDF or ePub) from Manning as well as access to the online liveBook format (and its AI assistant that w......more
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulat......more
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulat......more
This book constitutes the refereed proceedings of the 20th International Conference on Critical Information Infrastructu......more
...more
This comprehensive introduction to the information security field covers the industry’s essential concepts, using real-w......more
This volume comprises selected papers presented at the International Conference on IoT and Its Applications 2024. The re......more
...more
Federated Intelligence: Unlocking Privacy-Preserving and Cyber Resilience using AI in the Finance Industry" is an edited......more
...more
An accurate and up-to-date guide to success on the AIGP certification exam and an essential resource for technology and ......more
In the digital age, information is the most vital asset and network technologies are the invisible threads that connect ......more