客服公告:反詐騙!不碰ATM、網銀、不說信用卡,認證藍勾勾FB粉絲頁詳情
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
...more
Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Cryptography is a part of everyday life for almost all of us, though we may not realise we’re using it. We are a far cry......more
Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more
...more
A robust yet accessible introduction to the idea, history, and key applications of differential privacy--the gold standa......more
A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widespread term for the com......more
...more
...more
...more
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more
Learn to code securely from the very beginning, with this straightforward and approachable guide! Alice and Bob Learn Se......more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
...more
...more
Welcome to the future of internet coordination. By now you’ve heard the buzz about Decentralized Autonomous Organization......more
...more
...more
...more
This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
Apply satisfiability to a range of difficult problems The Boolean Satisfiability Problem (SAT) is one of the most famous......more
In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more
...more
...more
...more
The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more
Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more
...more
...more
...more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
Technical theory, key technologies, and practical applications for consortium blockchains, with a solution to the CAP tr......more
This book explores the problem of minimal valid graph coloring, first in the form of games and then of resolution algori......more
A comprehensive monograph chronicling the phenomenal rise of CryptoPunks - one of the world’s first and most sought-afte......more
Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge thro......more
Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities presents the applications of the hea......more
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more
An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more
Secure your entire software supply chain, including the code you write, the libraries you use, and the platforms you run......more
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by......more
The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and desc......more
The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and desc......more
Modern enterprises are facing growing cybersecurity issues due to the massive volume of security-related data they gener......more
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source e......more
...more
Although recent advances in technology have made life easier for individuals, societies and states, they have also led t......more
In today’s world, Cybersecurity attacks and security breaches are literally becoming the norm. Unfortunately, we are not......more
In today’s world, Cybersecurity attacks and security breaches are literally becoming the norm. Unfortunately, we are not......more
This text focuses on the recent research, innovation, regulation, policies, standards, and applications in the emerging ......more
Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly ever since them. For example......more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly ever since them. For example......more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
An exploration of the emerging quantum technological paradigm and its effects on human consciousness and cultures. In Qu......more
Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It i......more
The book explores comprehensive demonstration of the performance analytics following the implementation of the authentic......more
...more
In today’s interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient ......more
In the era of digital transformation, the landscape of healthcare is undergoing a profound paradigm shift, driven by tec......more
Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more
Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more
A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more
A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more
High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents state-of-the art high-l......more
In the context of information security, social engineering is the manipulation of people into performing actions or divu......more
’Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expa......more
’Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expa......more
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment ......more
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment ......more
Nowadays, the latest technologies can be found not only in healthcare and space application but also in hybrid supercars......more
Explainable AI (XAI) is an upcoming research field in the domain of machine learning. This book aims to provide a detail......more
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve......more
Discover the future of cybersecurity through the eyes of the world’s first augmented ethical hacker In Human Hacked: My ......more
"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibra......more
"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibra......more
...more
...more
...more