排序依

共有9963

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Metaverse and Blockchain Use Cases and Applications

Metaverse and Blockchain Use Cases and Applications

  • Ingram,出版日期:2027-07-01

Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more

Artificial Intelligence and Quantum Dynamics for Memristor-System Computing

Artificial Intelligence and Quantum Dynamics for Memristor-System Computing

  • Ingram,出版日期:2026-03-28

This book covers state-of-the-art topics in the multidisciplinary areas of Artificial Intelligence (AI) and advanced con......more

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

This surprisingly accessible book uses key math concepts and more than 500 short exercises to teach functional programmi......more

Big Data Technologies and Analytics: Ai, Iot and Blockchain Technology

Big Data Technologies and Analytics: Ai, Iot and Blockchain Technology

Understand the future of a thriving research toolkit with this introduction to big data analytics In recent decades, big......more

Lattice-Based Cryptography: From Theory to Practice

Lattice-Based Cryptography: From Theory to Practice

  • Ingram,出版日期:2026-01-11

Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more

Principles of Software Engineering: Secure Software Development

Principles of Software Engineering: Secure Software Development

This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more

Large Event Security Planning and Emergency Management

Large Event Security Planning and Emergency Management

This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more

Applied Introduction to Cryptography and Cybersecurity

Applied Introduction to Cryptography and Cybersecurity

This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more

Applied Introduction to Cryptography and Cybersecurity

Applied Introduction to Cryptography and Cybersecurity

This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more

The Joy of Cryptography: An Undergraduate Course in Provable Security

The Joy of Cryptography: An Undergraduate Course in Provable Security

A comprehensive introduction to the fundamentals of provable security for advanced undergraduates. This accessible textb......more

Computer Security: A Hands-On Approach (Third Edition)

Computer Security: A Hands-On Approach (Third Edition)

This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more

Introduction to Biometrics

Introduction to Biometrics

This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioner......more

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolvin......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Certificate of Cloud Security Knowledge (Ccsk V5) Official Study Guide: In-Depth Guidance and Practice

Certificate of Cloud Security Knowledge (Ccsk V5) Official Study Guide: In-Depth Guidance and Practice

As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certi......more

Hacking for Dummies

Hacking for Dummies

Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to u......more

Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide

Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide

The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, pos......more

Cyber Security in Business Analytics

Cyber Security in Business Analytics

  • Ingram,出版日期:2025-10-07

This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersec......more

Multiple-Valued Computing in Quantum Molecular Biology: Arithmetic and Combinational Circuits

Multiple-Valued Computing in Quantum Molecular Biology: Arithmetic and Combinational Circuits

This book focuses on the design methodologies of various quantum circuits, DNA circuits, DNA-quantum circuits and quantu......more

Russia’s Hybrid Warfare Offensive Against the West

Russia’s Hybrid Warfare Offensive Against the West

This book is a timely and systematic analysis of Russian hybrid warfare with a particular focus on Russian cyberespionag......more

Data Analytics Using Machine Learning Techniques on Cloud Platforms

Data Analytics Using Machine Learning Techniques on Cloud Platforms

Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning and cloud computing co......more

Introduction to Quantum Computing

Introduction to Quantum Computing

Learn to program tomorrow’s technology with this accessible exploration of quantum computing, requiring only high school......more

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

Cybersecurity 2050: Protecting Humanity in a Hyper-Connected World

This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more

Iot, Blockchain, and Smart Healthcare: Integration Techniques and Case Studies

Iot, Blockchain, and Smart Healthcare: Integration Techniques and Case Studies

  • Ingram,出版日期:2025-09-10

The book examines the integration of IoT, Blockchain, and Smart Healthcare, providing a comprehensive analysis of these ......more

Digital Strategy and Governance in Transformative Technologies

Digital Strategy and Governance in Transformative Technologies

  • Ingram,出版日期:2025-09-09

Digital Strategy and Governance in Transformative Technologies offers a comprehensive exploration of how emerging techno......more

Digital Strategy and Governance in Transformative Technologies

Digital Strategy and Governance in Transformative Technologies

  • Ingram,出版日期:2025-09-09

Digital Strategy and Governance in Transformative Technologies offers a comprehensive exploration of how emerging techno......more

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing

This book introduces quantum computing and quantum communications at the undergraduate level for students in the physica......more

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing

This book introduces quantum computing and quantum communications at the undergraduate level for students in the physica......more

Certified Ethical Hacker (Ceh) Study Guide: In-Depth Guidance and Practice

Certified Ethical Hacker (Ceh) Study Guide: In-Depth Guidance and Practice

The Certified Ethical Hacker (CEH) exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and tax......more

Guardians of the Digital Age: Securing the Future

Guardians of the Digital Age: Securing the Future

The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more

Guardians of the Digital Age: Securing the Future

Guardians of the Digital Age: Securing the Future

The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more

Secure Detection and Control in Cyber-Physical Systems: Working in the Presence of Malicious Data

Secure Detection and Control in Cyber-Physical Systems: Working in the Presence of Malicious Data

In this pioneering reference work, Yan, Mo, and Wen explain secure detection and control algorithms for cyber-physical s......more

Philosophy.Exe: The Techno-Philosophical Toolkit for Modern Minds

Philosophy.Exe: The Techno-Philosophical Toolkit for Modern Minds

We live in an age of unprecedented complexity, where technology, cognitive biases, and societal systems shape our decisi......more

Philosophy.Exe: The Techno-Philosophical Toolkit for Modern Minds

Philosophy.Exe: The Techno-Philosophical Toolkit for Modern Minds

We live in an age of unprecedented complexity, where technology, cognitive biases, and societal systems shape our decisi......more

Nonlocal Quantum Computing Theory

Nonlocal Quantum Computing Theory

Nonlocal Quantum Computing Theory offers a fresh perspective on quantum computing, moving beyond the traditional qubit-b......more

Applications of Blockchain Technology

Applications of Blockchain Technology

  • Ingram,出版日期:2025-08-19

This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable ......more

Insuring Cyberinsecurity: Insurance Companies as Symbolic Regulators

Insuring Cyberinsecurity: Insurance Companies as Symbolic Regulators

A free ebook version of this title is available through Luminos, University of California Press’s Open Access publishing......more

Insuring Cyberinsecurity: Insurance Companies as Symbolic Regulators

Insuring Cyberinsecurity: Insurance Companies as Symbolic Regulators

A free ebook version of this title is available through Luminos, University of California Press’s Open Access publishing......more

Cyber Warfare and Navies

Cyber Warfare and Navies

As with all elements of the digital age, navies and commercial maritime operations around the world have become increasi......more

Metaverse and Blockchain Use Cases and Applications

Metaverse and Blockchain Use Cases and Applications

  • Ingram,出版日期:2025-08-12

Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more

Metaverse Platform Implementation: Ai, Security, and Applications

Metaverse Platform Implementation: Ai, Security, and Applications

  • Ingram,出版日期:2025-08-06

Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineerin......more

Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms

Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms

  • Ingram,出版日期:2025-08-05

A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widespread term for the com......more

The Cybernetic Society: How Humans and Machines Will Shape the Future Together

The Cybernetic Society: How Humans and Machines Will Shape the Future Together

Why the major risk and opportunity of AI is that humans and computers have fused, giving AI the ability to shape the fut......more

Preventing Bluetooth and Wireless Attacks in Iomt Healthcare Systems

Preventing Bluetooth and Wireless Attacks in Iomt Healthcare Systems

A timely technical guide to securing network-connected medical devices In Preventing Bluetooth and Wireless Attacks in I......more

Securing the Digital Frontier: Cyber Security for Responsible Citizens and Strategic Thinkers

Securing the Digital Frontier: Cyber Security for Responsible Citizens and Strategic Thinkers

Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected......more

The Joy of Quantum Computing: A Concise Introduction

The Joy of Quantum Computing: A Concise Introduction

An engaging and accessible presentation of the most famous algorithms and applications of quantum computing The Joy of Q......more

The Joy of Quantum Computing: A Concise Introduction

The Joy of Quantum Computing: A Concise Introduction

An engaging and accessible presentation of the most famous algorithms and applications of quantum computing The Joy of Q......more

PostgreSQL Mistakes and How to Avoid Them

PostgreSQL Mistakes and How to Avoid Them

Recognize and avoid these sixty common PostgreSQL mistakes! The best mistakes to learn from are ones made by other peopl......more

Generative Artificial Intelligence in Healthcare: Current Practices and Future Development

Generative Artificial Intelligence in Healthcare: Current Practices and Future Development

  • Ingram,出版日期:2025-07-29

Generative AI is a transformative force in smart healthcare. It can produce contents virtually indistinguishable from hu......more

China and Its Embrace of Offensive Cyberespionage

China and Its Embrace of Offensive Cyberespionage

The West is under challenge from the rise of China as a global power. Cyberespionage has enhanced China’s economy, milit......more

The Digital Environment and Small States in Europe: Challenges, Threats, and Opportunities

The Digital Environment and Small States in Europe: Challenges, Threats, and Opportunities

  • Ingram,出版日期:2025-07-25

The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global securit......more

Network Security, Firewalls, and VPNs

Network Security, Firewalls, and VPNs

"This book is designed for anyone who wants to gain knowledge and hands-on experience with working, administrating, and ......more

Securing Talent: Building and Retaining High-Performance Cybersecurity Teams

Securing Talent: Building and Retaining High-Performance Cybersecurity Teams

Securing Talent: Building and Retaining High-Performance Cybersecurity Teams by Dr. Kevin Lynn McLaughlin, PhD, offers a......more

Reengineering Cyber Security Process: Quality Management

Reengineering Cyber Security Process: Quality Management

In today’s rapidly evolving information technology landscape, cyber-attacks on company assets and IT systems are becomin......more

Securing Talent: Building and Retaining High-Performance Cybersecurity Teams

Securing Talent: Building and Retaining High-Performance Cybersecurity Teams

Securing Talent: Building and Retaining High-Performance Cybersecurity Teams by Dr. Kevin Lynn McLaughlin, PhD, offers a......more

Cutting-Edge Artificial Intelligence Advances and Implications in Real-World Applications

Cutting-Edge Artificial Intelligence Advances and Implications in Real-World Applications

Artificial intelligence (AI) is impacting industries worldwide by introducing new methods and altering traditional pract......more

Cutting-Edge Artificial Intelligence Advances and Implications in Real-World Applications

Cutting-Edge Artificial Intelligence Advances and Implications in Real-World Applications

Artificial intelligence (AI) is impacting industries worldwide by introducing new methods and altering traditional pract......more

Quantum Computing and Artificial Intelligence in Logistics and Supply Chain Management

Quantum Computing and Artificial Intelligence in Logistics and Supply Chain Management

  • Ingram,出版日期:2025-07-09

Quantum Computing in Logistics and Supply Chain Management discusses the transformative potential of quantum computing i......more

Advancements in Cybersecurity: Next-Generation Systems and Applications

Advancements in Cybersecurity: Next-Generation Systems and Applications

  • Ingram,出版日期:2025-07-08

This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It......more

Multimedia Security: Tools, Techniques, and Applications

Multimedia Security: Tools, Techniques, and Applications

  • Ingram,出版日期:2025-07-07

Multimedia security has become one of the most important topics for organizations and individuals. Presenting important ......more

1001 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類