排序依

共有10267

Modern Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem

Modern Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem

Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerabil......more

SAP Analytics Cloud: Predictive Analytics

SAP Analytics Cloud: Predictive Analytics

"Today’s organizations must be prepared for tomorrow’s events. Forecast future behavior in SAP Analytics Cloud with this......more

Cyber Operations: A Case Study Approach

Cyber Operations: A Case Study Approach

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more

Machine Learning for Cyber Security: 5th International Conference, Ml4cs 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings

Machine Learning for Cyber Security: 5th International Conference, Ml4cs 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings

  • Ingram,出版日期:2024-04-23

This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Securit......more

Computing, Communication and Learning: Second International Conference, Cocole 2023, Warangal, India, August 29-31, 2023, Proceedings

Computing, Communication and Learning: Second International Conference, Cocole 2023, Warangal, India, August 29-31, 2023, Proceedings

  • Ingram,出版日期:2024-04-17

This volume constitutes the refereed proceedings of the Second International Conference on Computing, Communication and ......more

Comparative Genomics: 21st International Conference, Recomb-CG 2024, Boston, Ma, Usa, April 27-28, 2024, Proceedings

Comparative Genomics: 21st International Conference, Recomb-CG 2024, Boston, Ma, Usa, April 27-28, 2024, Proceedings

  • Ingram,出版日期:2024-04-17

This book constitutes the proceedings of the 21st International Conference on Comparative Genomics, RECOMB-CG 2024, whic......more

Advanced Computing: 13th International Conference, Iacc 2023, Kolhapur, India, December 15-16, 2023, Revised Selected Papers, Part I

Advanced Computing: 13th International Conference, Iacc 2023, Kolhapur, India, December 15-16, 2023, Revised Selected Papers, Part I

  • Ingram,出版日期:2024-04-15

The two-volume set CCIS 2053 and 2054 constitutes the refereed post-conference proceedings of the 13th International Adv......more

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud secur......more

Deep Learning Models: A Practical Approach for Hands-On Professionals

Deep Learning Models: A Practical Approach for Hands-On Professionals

This book focuses on and prioritizes a practical approach, minimizing theoretical concepts to deliver algorithms effecti......more

Mastering Secure Java Applications: Navigating Security in Cloud and Microservices for Java

Mastering Secure Java Applications: Navigating Security in Cloud and Microservices for Java

This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust ......more

AI and ML Applications for Decision-Making in Zero Trust Cyber Security

AI and ML Applications for Decision-Making in Zero Trust Cyber Security

Discover the future of cybersecurity with "AI and ML Applications for Decision-Making on Zero Trust Cyber Security: Volu......more

Applying Artificial Intelligence in Cyber Security Analytics and Cyber Threat Detection

Applying Artificial Intelligence in Cyber Security Analytics and Cyber Threat Detection

APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing ......more

Zero Trust Networks

Zero Trust Networks

  • Ingram,出版日期:2024-04-02

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm ......more

Cisco Meraki Fundamentals

Cisco Meraki Fundamentals

Are you ready to challenge the ways you have always approached networking? The IT world has undergone a transformation, ......more

Corporate Taxonomy

Corporate Taxonomy

It is a question of observing the diversity of content on taxonomy and its existing construction methods, according to t......more

The OSINT Handbook: A practical guide to gathering and analyzing online information

The OSINT Handbook: A practical guide to gathering and analyzing online information

Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more

ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills

ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills

Master ChatGPT and the OpenAI API and harness the power of cutting-edge generative AI and large language models to revol......more

#DigitalMarket: The influence of the new consumer profile

#DigitalMarket: The influence of the new consumer profile

The aim of this study was to understand and analyze the new forms of sociability on the Internet, through a deeper under......more

Advanced Computing: 13th International Conference, Iacc 2023, Kolhapur, India, December 15-16, 2023, Revised Selected Papers, Part II

Advanced Computing: 13th International Conference, Iacc 2023, Kolhapur, India, December 15-16, 2023, Revised Selected Papers, Part II

  • Ingram,出版日期:2024-03-26

The two-volume set CCIS 2053 and 2054 constitutes the refereed post-conference proceedings of the 13th International Adv......more

Communication Technologies and Security Challenges in Iot: Present and Future

Communication Technologies and Security Challenges in Iot: Present and Future

  • Ingram,出版日期:2024-03-26

This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigb......more

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspe......more

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks

This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversari......more

Cyber Security

Cyber Security

There has been an increase in cybercrime and a search for government or private company assets that have failed security......more

Use and representation of the Internet by adolescents

Use and representation of the Internet by adolescents

An analysis of adolescents’ representations and uses of computers connected to the Internet, understanding them as recip......more

Inductive Logic Programming: 31st International Conference, Ilp 2022, Windsor Great Park, Uk, September 28-30, 2022, Proceedings

Inductive Logic Programming: 31st International Conference, Ilp 2022, Windsor Great Park, Uk, September 28-30, 2022, Proceedings

  • Ingram,出版日期:2024-03-20

This book constitutes the refereed proceedings of the 31st International Conference on Inductive Logic Programming, ILP ......more

Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective

Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective

As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress......more

Decentralized Privacy Preservation in Smart Cities

Decentralized Privacy Preservation in Smart Cities

This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present......more

Artificial Intelligence for Cyber Defence and Smart Policing

Artificial Intelligence for Cyber Defence and Smart Policing

  • Ingram,出版日期:2024-03-19

Artificial Intelligence for Cyber Defence and Smart Policing will describe the best way of practising artificial intelli......more

2nd International Congress of Electrical and Computer Engineering

2nd International Congress of Electrical and Computer Engineering

  • Ingram,出版日期:2024-03-19

This proceedings presents the papers included in the 2nd International Congress of Electrical and Computer Engineering (......more

Europrivacy(TM)/(R): The first European Data Protection Seal

Europrivacy(TM)/(R): The first European Data Protection Seal

On 12 October 2022, the EDPB (European Data Protection Board) endorsed the Europrivacy(TM)/(R) certification scheme. Thi......more

Secure and Resilient Digital Transformation of Healthcare: First Workshop, Sunrise 2023, Stavanger, Norway, November 27, 2023, Proceedings

Secure and Resilient Digital Transformation of Healthcare: First Workshop, Sunrise 2023, Stavanger, Norway, November 27, 2023, Proceedings

  • Ingram,出版日期:2024-03-16

This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in N......more

Connected Through Chaos

Connected Through Chaos

In ’Connected through Chaos: Telecommunications Resilience Strategies’, Anshul Yadav, a telecom professional, unveils a ......more

Security-Driven Software Development: Learn to analyze and mitigate risks in your software projects

Security-Driven Software Development: Learn to analyze and mitigate risks in your software projects

Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, a......more

Optimum Spending on Cybersecurity Measures: Devops

Optimum Spending on Cybersecurity Measures: Devops

This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more

Optimum Spending on Cybersecurity Measures: Devops

Optimum Spending on Cybersecurity Measures: Devops

This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more

Introduction to Cybersecurity in Internet of Things

Introduction to Cybersecurity in Internet of Things

This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the ......more

Robocup 2023: Robot World Cup XXVI

Robocup 2023: Robot World Cup XXVI

  • Ingram,出版日期:2024-03-14

This book constitutes the proceedings of the 26th RoboCup International Symposium which was held in Bordeaux, France, du......more

Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware

Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity ......more

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed ar......more

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed ar......more

Moodle 4 Security: Enhance security, regulation, and compliance within your Moodle infrastructure

Moodle 4 Security: Enhance security, regulation, and compliance within your Moodle infrastructure

Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKe......more

Once Upon Tomorrow: Harnessing the New Opportunities the Metaverse Creates

Once Upon Tomorrow: Harnessing the New Opportunities the Metaverse Creates

Shurick Agapitov’s Once Upon Tomorrow unpacks the sometimes vague concept of the metaverse and shares the opportunities ......more

Infrastructure Attack Strategies for Ethical Hacking

Infrastructure Attack Strategies for Ethical Hacking

Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies. Book Description Embark on ......more

The Metaverse and Smart Cities: Urban Environments in the Age of Digital Connectivity

The Metaverse and Smart Cities: Urban Environments in the Age of Digital Connectivity

The Metaverse and Smart Cities: Urban Environments in the Age of Digital Connectivity explores the intersection between ......more

Smart Boundaries: Safe Children - A Parent’s Handbook

Smart Boundaries: Safe Children - A Parent’s Handbook

Shaping a World of Respect: Guarding the Innocence of Youth Embark on a transformative journey with "Smart Boundaries: S......more

Mastering the Maze: Navigate to Success with Google Ads

Mastering the Maze: Navigate to Success with Google Ads

"Mastering the Maze: Navigate to Success with Google Ads" is your ultimate guide to harnessing the power of Google Ads t......more

A Comprehensive Research Analysis on Effective Data Mining Techniques

A Comprehensive Research Analysis on Effective Data Mining Techniques

This book provides for a deeper insight into the Data Mining Techniques used in the present day scenario in almost all f......more

Ipv6 Network Slicing: Offering New Experience for Industries

Ipv6 Network Slicing: Offering New Experience for Industries

This book is an essential guide to IPv6 network slicing. It covers both the fundamentals and cutting-edge technologies o......more

PCI DSS Version 4.0: A guide to the payment card industry data security standard

PCI DSS Version 4.0: A guide to the payment card industry data security standard

The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 ......more

Web Application Security: Exploitation and Countermeasures for Modern Web Applications

Web Application Security: Exploitation and Countermeasures for Modern Web Applications

In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security......more

5g and Beyond Wireless Networks: Technology, Network Deployments and Materials for Antenna Design

5g and Beyond Wireless Networks: Technology, Network Deployments and Materials for Antenna Design

  • Ingram,出版日期:2024-02-26

5G and Beyond Wireless Networks: Technology, Network Deployments, and Materials for Antenna Design offers a comprehensiv......more

Embracing the Fog: Harnessing the Power of Mist Computing

Embracing the Fog: Harnessing the Power of Mist Computing

"Embracing the Fog: Harnessing the Power of Mist Computing," the book explores the concept of mist computing, also known......more

Foggy Horizons: Unraveling the Potential of Fog Computing

Foggy Horizons: Unraveling the Potential of Fog Computing

The book "Foggy Horizons: Unraveling the Potential of Fog Computing" provides a comprehensive exploration of fog computi......more

1031 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類