排序依

共有10729

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Lattice-Based Cryptography: From Theory to Practice

Lattice-Based Cryptography: From Theory to Practice

  • Ingram,出版日期:2027-07-15

Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more

Metaverse and Blockchain Use Cases and Applications

Metaverse and Blockchain Use Cases and Applications

  • Ingram,出版日期:2027-07-01

Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more

Theory of Quantum Computation: Mathematical Fundamentals

Theory of Quantum Computation: Mathematical Fundamentals

This unique compendium covers the core theory of quantum computation and deeply emphasizes the mathematical fundamentals......more

Theory of Quantum Computation: Mathematical Fundamentals

Theory of Quantum Computation: Mathematical Fundamentals

This unique compendium covers the core theory of quantum computation and deeply emphasizes the mathematical fundamentals......more

The Palgrave Handbook of Cybersecurity, Technologies and Energy Transitions

The Palgrave Handbook of Cybersecurity, Technologies and Energy Transitions

  • Ingram,出版日期:2026-12-16

This Handbook aims to address the complex interconnections between two transitions that lie at the heart of societal tra......more

Artificial Intelligence and Quantum Dynamics for Memristor-System Computing

Artificial Intelligence and Quantum Dynamics for Memristor-System Computing

  • Ingram,出版日期:2026-10-30

This book covers state-of-the-art topics in the multidisciplinary areas of Artificial Intelligence (AI) and advanced con......more

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

Communicating Cyber Risk: Build Cyber Resilience Through Compelling Communication

How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more

Decoding Cybersecurity: A Comprehensive Guide for the Non-Techie

Decoding Cybersecurity: A Comprehensive Guide for the Non-Techie

The imperative to defend against cyber threats is a fact of life in the digital age. World governments, Silicon Valley, ......more

Computer Security: A Hands-On Approach (Third Edition)

Computer Security: A Hands-On Approach (Third Edition)

This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more

Cryptography for Everyone

Cryptography for Everyone

Readers of all backgrounds will learn about cryptography’s role in protecting everyday digital interactions - from buyin......more

Healthcare 5.0 with Fuzzy Logic: Artificial Intelligence, Cyber-Physical Systems, and Medical Internet of Things

Healthcare 5.0 with Fuzzy Logic: Artificial Intelligence, Cyber-Physical Systems, and Medical Internet of Things

  • Ingram,出版日期:2026-06-03

The book was inspired by the urgent need for advanced security methods that can keep pace with the increasingly complex ......more

Big Data Technologies and Analytics: Ai, Iot and Blockchain Technology

Big Data Technologies and Analytics: Ai, Iot and Blockchain Technology

Understand the future of a thriving research toolkit with this introduction to big data analytics In recent decades, big......more

Certified Cloud Security Professional (Ccsp) Study Guide: Cloud Security for Everyone

Certified Cloud Security Professional (Ccsp) Study Guide: Cloud Security for Everyone

Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand ......more

School Security: How to Build and Strengthen a School Security Program

School Security: How to Build and Strengthen a School Security Program

School Security: How to Build and Strengthen a School Safety Program, Third Edition emphasizes a proactive rather than r......more

Beyond Cybersecurity: Understanding Risk and Governmentality in a Digital World

Beyond Cybersecurity: Understanding Risk and Governmentality in a Digital World

Available open access digitally under CC-BY-NC-ND licence. What does it mean to live in a world where our most essential......more

The Basics of Digital Forensics

The Basics of Digital Forensics

The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This......more

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more

Technology and Beyond: Business Solutions for One World, One Future

Technology and Beyond: Business Solutions for One World, One Future

  • Ingram,出版日期:2026-05-31

Symbiosis Institute of Management Studies (SIMS), Pune, organized its 15th Annual International Research Conference, SIM......more

Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education

Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education

  • Ingram,出版日期:2026-05-30

Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education explores the transf......more

Proof of Trust: An Innovator’s Guide to the Past, Present, and Future of Blockchains

Proof of Trust: An Innovator’s Guide to the Past, Present, and Future of Blockchains

An eye-opening discussion of how to apply new blockchain technologies to realize our digital potential In Zero Knowledge......more

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

This surprisingly accessible book uses key math concepts and more than 500 short exercises to teach functional programmi......more

Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education

Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education

  • Ingram,出版日期:2026-05-08

Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education explores the transf......more

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

  • Ingram,出版日期:2026-05-07

The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

Online Trust and Safety: Tools to Combat Online Harms, Misinformation and Malicious Content

  • Ingram,出版日期:2026-05-07

The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing, Third Edition serves as an introduction to the steps required to complete......more

Dark Screens: Hackers and Heroes in the Shadowy World of Ransomware

Dark Screens: Hackers and Heroes in the Shadowy World of Ransomware

A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are--......more

Software Security for Developers: With Examples in Java and Spring

Software Security for Developers: With Examples in Java and Spring

Free PDF and epub formats plus online reader with AI assistant. Cloud applications have special security requirements an......more

Quantum Machine Learning: Concepts, Algorithms, and Applications

Quantum Machine Learning: Concepts, Algorithms, and Applications

  • Ingram,出版日期:2026-04-23

In the exploration of new frontiers in data-driven solutions, the potential of quantum-enhanced machine learning has bec......more

Quantum Machine Learning: Concepts, Algorithms, and Applications

Quantum Machine Learning: Concepts, Algorithms, and Applications

  • Ingram,出版日期:2026-04-23

In the exploration of new frontiers in data-driven solutions, the potential of quantum-enhanced machine learning has bec......more

Research Advances in Intelligent Computing: Volume 3

Research Advances in Intelligent Computing: Volume 3

  • Ingram,出版日期:2026-04-23

As computers and intelligent machines evolve at an unprecedented pace, the quest to replicate human intelligence in soft......more

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint) - Volume I

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint) - Volume I

The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint) - Volume I

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint) - Volume I

The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint): Volume II

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint): Volume II

The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint): Volume II

Cryptocurrency Forensics and Investigation Using Open Source Intelligence Techniques (Osint): Volume II

The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more

Reversing the Dark Web: Dissecting the Tools of the Underground Economy

Reversing the Dark Web: Dissecting the Tools of the Underground Economy

A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-s......more

Emerging Technology and the Law: Bridging the Gap Between Innovation and Regulation

Emerging Technology and the Law: Bridging the Gap Between Innovation and Regulation

  • Ingram,出版日期:2026-04-21

This book explores the multifaceted implications of technological innovation on legal systems, addressing how emerging t......more

Platform Criminality and Post-Crime: How Cybercrime (and Everything Else) Changed

Platform Criminality and Post-Crime: How Cybercrime (and Everything Else) Changed

This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform. O......more

Platform Criminality and Post-Crime: How Cybercrime (and Everything Else) Changed

Platform Criminality and Post-Crime: How Cybercrime (and Everything Else) Changed

This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform. O......more

Quantum Artificial Intelligence: Technologies, Algorithms and Programming

Quantum Artificial Intelligence: Technologies, Algorithms and Programming

  • Ingram,出版日期:2026-04-17

This book explores the transformative potential of Quantum computing in artificial intelligence and its impact on variou......more

Quantum Computing: Research, Applications, and Advances

Quantum Computing: Research, Applications, and Advances

  • Ingram,出版日期:2026-04-16

Quantum computing is a rapidly emerging technology that harnesses the laws of quantum mechanics to solve problems too co......more

Application Intelligence and Blockchain Security: 7th International Conference, Aiblock 2025, Beijing, China, July 19-20, 2025, Proceedings

Application Intelligence and Blockchain Security: 7th International Conference, Aiblock 2025, Beijing, China, July 19-20, 2025, Proceedings

  • Ingram,出版日期:2026-04-11

This volume constitutes the proceedings of the 7th International Conference on Application Intelligence and Blockchain S......more

Quantum Computing for Multimedia Processing, Teleportation, and Secure Networks

Quantum Computing for Multimedia Processing, Teleportation, and Secure Networks

  • Ingram,出版日期:2026-04-09

Quantum Computing for Multimedia Processing, Teleportation, and Secure Networks offers a comprehensive exploration of qu......more

Cumulative Effect: Cyber Security Guide for Directors and Ceos

Cumulative Effect: Cyber Security Guide for Directors and Ceos

Historically, cyber security was always a "poor relation" in the eyes of the majority of Boards and CEOs, considered inf......more

Cumulative Effect: Cyber Security Guide for Directors and Ceos

Cumulative Effect: Cyber Security Guide for Directors and Ceos

Historically, cyber security was always a "poor relation" in the eyes of the majority of Boards and CEOs, considered inf......more

Handbook of Security, Quantum Computing and Internet of Things (Iot)

Handbook of Security, Quantum Computing and Internet of Things (Iot)

  • Ingram,出版日期:2026-04-02

The Handbook of Security, Quantum Computing, and Internet of Things explores the critical intersection of IoT, security,......more

Learning Serverless Security: Hacking and Securing Serverless Cloud Applications on Aws, Azure, and Gcp

Learning Serverless Security: Hacking and Securing Serverless Cloud Applications on Aws, Azure, and Gcp

Despite the increased adoption of serverless computing services around the world, a big gap still exists when it comes t......more

Understanding Healthcare Cybersecurity, Ai, and Emerging Technologies: Protecting Patients and Their Data

Understanding Healthcare Cybersecurity, Ai, and Emerging Technologies: Protecting Patients and Their Data

Healthcare cybersecurity has changed significantly over the past decade. A compliance-driven, checklist-based approach u......more

Understanding Healthcare Cybersecurity, Ai, and Emerging Technologies: Protecting Patients and Their Data

Understanding Healthcare Cybersecurity, Ai, and Emerging Technologies: Protecting Patients and Their Data

Healthcare cybersecurity has changed significantly over the past decade. A compliance-driven, checklist-based approach u......more

Quantum Clear: Quantum Mechanics Free of Paradoxes

Quantum Clear: Quantum Mechanics Free of Paradoxes

This book presents quantum mechanics from two of its most fundamental pillars, quantum interference and quantum entangle......more

Quantum Clear: Quantum Mechanics Free of Paradoxes

Quantum Clear: Quantum Mechanics Free of Paradoxes

This book presents quantum mechanics from two of its most fundamental pillars, quantum interference and quantum entangle......more

Understanding Blockchain in Construction: A Practical Guide

Understanding Blockchain in Construction: A Practical Guide

Understanding Blockchain in Construction: A Practical Guide is an essential resource that offers a comprehensive explora......more

Understanding Blockchain in Construction: A Practical Guide

Understanding Blockchain in Construction: A Practical Guide

Understanding Blockchain in Construction: A Practical Guide is an essential resource that offers a comprehensive explora......more

Hardware Security: The Practical Guide to Penetration Testing and Prevention

Hardware Security: The Practical Guide to Penetration Testing and Prevention

Defend your system against hardware-based security breaches by thinking like a hacker! With this guide, master the tools......more

The Ghidra Book, 2nd Edition: The Definitive Guide

The Ghidra Book, 2nd Edition: The Definitive Guide

A guide to using the Ghidra software reverse engineering tool suite. DANCE WITH THE DRAGON The result of more than a dec......more

The AI Cybersecurity Handbook

The AI Cybersecurity Handbook

An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization’s cyber d......more

Beyond the Invisible Nexus: Dark Web, Dark AI & Offensive Security

Beyond the Invisible Nexus: Dark Web, Dark AI & Offensive Security

This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools and offensive se......more

Beyond the Invisible Nexus: Dark Web, Dark AI & Offensive Security

Beyond the Invisible Nexus: Dark Web, Dark AI & Offensive Security

This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools and offensive se......more

Red Team Engineering: The Art of Building Offensive Tools and Infrastructure

Red Team Engineering: The Art of Building Offensive Tools and Infrastructure

A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration te......more

Quantum Computing, Sensing and Communications for Iot

Quantum Computing, Sensing and Communications for Iot

  • Ingram,出版日期:2026-03-13

This book presents fundamentals of quantum computing and Internet of Things (IoT). It covers many applications of quantu......more

Ai-Driven Cyber Risk Management

Ai-Driven Cyber Risk Management

  • Ingram,出版日期:2026-03-12

This book provides a comprehensive exploration of how artificial intelligence (AI) is revolutionizing cyber risk managem......more

Applied Introduction to Cryptography and Cybersecurity

Applied Introduction to Cryptography and Cybersecurity

This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more

Applied Introduction to Cryptography and Cybersecurity

Applied Introduction to Cryptography and Cybersecurity

This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more

Unveiling the Art of Steganography: A Modern Approach

Unveiling the Art of Steganography: A Modern Approach

This book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the his......more

Unveiling the Art of Steganography: A Modern Approach

Unveiling the Art of Steganography: A Modern Approach

This book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the his......more

Learning Ransomware Response & Recovery: Stopping Ransomware One Restore at a Time

Learning Ransomware Response & Recovery: Stopping Ransomware One Restore at a Time

Ransomware attacks are no longer a question of if--it’s a matter of when. With hackers increasingly targeting backup and......more

Quantum Cryptography and Annealing for Securing Industrial Iot

Quantum Cryptography and Annealing for Securing Industrial Iot

  • Ingram,出版日期:2026-03-01

Quantum Cryptography and Annealing for Securing Industrial IoT explores cutting-edge quantum security strategies designe......more

Cost-Effective Cybersecurity: A Multi-Tiered Defense Framework with Open-Source Solutions

Cost-Effective Cybersecurity: A Multi-Tiered Defense Framework with Open-Source Solutions

This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions th......more

Cryptoeconomic Theory

Cryptoeconomic Theory

  • Ingram,出版日期:2026-02-28

This volume explores cryptoeconomic theories shaping blockchain and its integration with AI in the modern redefinition o......more

International Conference on Communication Security and Information Processing: Csip 2024

International Conference on Communication Security and Information Processing: Csip 2024

  • Ingram,出版日期:2026-02-25

This book presents the proceedings of the Communication Security and Information Processing Conference (CSIP 2024), whic......more

Adversarial Machine Learning: Mechanisms, Vulnerabilities, and Strategies for Trustworthy AI

Adversarial Machine Learning: Mechanisms, Vulnerabilities, and Strategies for Trustworthy AI

Enables readers to understand the full lifecycle of adversarial machine learning (AML) and how AI models can be compromi......more

Cybersecurity Essentials for Business Leaders: Building Cyber-Resilient Organizations in the Digital Age

Cybersecurity Essentials for Business Leaders: Building Cyber-Resilient Organizations in the Digital Age

This book captures the intersection of strategic leadership, innovation, and cybersecurity, and is written for business ......more

Audit Alchemy: Small Teams, Big Impact - A Guide to Internal Audit Excellence

Audit Alchemy: Small Teams, Big Impact - A Guide to Internal Audit Excellence

When high expectations do not always match the resources at your disposal, how can small Internal Audit teams make a sig......more

Audit Alchemy: Small Teams, Big Impact - A Guide to Internal Audit Excellence

Audit Alchemy: Small Teams, Big Impact - A Guide to Internal Audit Excellence

When high expectations do not always match the resources at your disposal, how can small Internal Audit teams make a sig......more

Security Intelligence and Sdg16: Applying Machine Learning for Peaceful and Inclusive Societies

Security Intelligence and Sdg16: Applying Machine Learning for Peaceful and Inclusive Societies

  • Ingram,出版日期:2026-02-16

In today’s rapidly evolving digital landscape, traditional security frameworks struggle to keep pace with increasingly s......more

Distributed Ledger Technology in Communication: Integration of Iot, Blockchain and Metadata

Distributed Ledger Technology in Communication: Integration of Iot, Blockchain and Metadata

  • Ingram,出版日期:2026-02-16

This book offers a comprehensive exploration of distributed ledger technology (DLT) in communication. The book first del......more

Quantum Robustness in Artificial Intelligence: Principles and Applications

Quantum Robustness in Artificial Intelligence: Principles and Applications

  • Ingram,出版日期:2026-02-16

This book surveys state-of-the-art research on adversarial robustness of quantum machine learning algorithms. Despite th......more

Quantum Ops: Bridging Quantum Computing and It Operations

Quantum Ops: Bridging Quantum Computing and It Operations

  • Ingram,出版日期:2026-02-14

This book provides a thorough guide to Quantum Operations that closes the gap between quantum computing theory and pract......more

Mathematical Research for Blockchain Economy: 6th International Conference Marble 2025, Athens, Greece

Mathematical Research for Blockchain Economy: 6th International Conference Marble 2025, Athens, Greece

  • Ingram,出版日期:2026-02-14

This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy......more

Secure It Systems: 30th Nordic Conference, Nordsec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

Secure It Systems: 30th Nordic Conference, Nordsec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

  • Ingram,出版日期:2026-02-12

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in......more

1081 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類