排序依

共有8277

Futuristic e-Governance Security With Deep Learning Applications

Futuristic e-Governance Security With Deep Learning Applications

  • Ingram,出版日期:2024-01-24

"The book focuses on the recent advances and challenges related to the concerns of security and privacy issues in deep l......more

Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication

Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication

Introducing the "Trojan Exposed" Book Bundle: Your Ultimate Defense Against Cyber Threats! ����️ Are you concerned about......more

NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library

NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library

Unlock the Power of Network Security with the NMAP Network Scanning Series! Welcome to the Network Security, Monitoring,......more

Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark

Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark

���� Wireless Exploits and Countermeasures Book Bundle ���� Unveil the Secrets of Wireless Security with Our Comprehensi......more

Guide to Computer Network Security

Guide to Computer Network Security

This timely textbook presents a comprehensive guide to the core topics in computing and information security and assuran......more

Advanced OSINT Strategies: Online Investigations And Intelligence Gathering

Advanced OSINT Strategies: Online Investigations And Intelligence Gathering

Unlock the Power of Advanced OSINT Strategies Welcome to the "Advanced OSINT Strategies" book bundle - your ultimate gui......more

Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices

Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices

Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft GraphKey Feature......more

Security in Smart Home Networks

Security in Smart Home Networks

This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice......more

Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses

Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses

This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced,......more

Information Security Planning: A Practical Approach

Information Security Planning: A Practical Approach

This book demonstrates how information security requires a deep understanding of an organization’s assets, threats and p......more

Identifying and Mitigating the Security Risks of Generative AI

Identifying and Mitigating the Security Risks of Generative AI

Every major technical invention resurfaces the dual-use dilemma - the new technology has the potential to be used for go......more

Cyber Security for Next-Generation Computing Technologies

Cyber Security for Next-Generation Computing Technologies

  • Ingram,出版日期:2024-01-16

This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizin......more

Pentesting 101: Cracking Gadgets And Hacking Software

Pentesting 101: Cracking Gadgets And Hacking Software

Introducing the Ultimate Ethical Hacking Book Bundle: "PENTESTING 101: CRACKING GADGETS AND HACKING SOFTWARE" Are you re......more

OSINT Hacker’s Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith

OSINT Hacker’s Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith

Introducing the "OSINT Hacker’s Arsenal" Book Bundle! Unlock the Power of Open Source Intelligence (OSINT) with our comp......more

Quantum Computing: Computer Science, Physics, And Mathematics

Quantum Computing: Computer Science, Physics, And Mathematics

���� Explore the Future with the "Quantum Computing: Computer Science, Physics, and Mathematics" Book Bundle! ���� Are y......more

Cryptocoding Based on Quasigroups

Cryptocoding Based on Quasigroups

This book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. The......more

Machine Learning Theory and Applications: Hands-On Use Cases with Python on Classical and Quantum Machines

Machine Learning Theory and Applications: Hands-On Use Cases with Python on Classical and Quantum Machines

Machine Learning Theory and Applications Enables readers to understand mathematical concepts behind data engineering and......more

OWASP Top 10 Vulnerabilities: Beginner’s Guide To Web Application Security Risks

OWASP Top 10 Vulnerabilities: Beginner’s Guide To Web Application Security Risks

���� Discover the Ultimate Web Application Security Book Bundle: OWASP Top 10 Vulnerabilities Are you ready to fortify y......more

Quantum Physics Voyage: Beginners Guide From String Theory To Quantum Computing

Quantum Physics Voyage: Beginners Guide From String Theory To Quantum Computing

���� Quantum Physics Voyage - Uncover the Secrets of the Quantum Universe! Are you fascinated by the mysteries of the qu......more

Azure Security

Azure Security

Secure your Azure applications the right way. The expert DevSecOps techniques you’ll learn in this essential handbook ma......more

Hacks, Leaks, and Revelations

Hacks, Leaks, and Revelations

"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data ......more

Building a Cyber Risk Management Program: Evolving Security for the Digital Age

Building a Cyber Risk Management Program: Evolving Security for the Digital Age

"Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framewor......more

Kali Linux CLI Boss: Novice To Command Line Maestro

Kali Linux CLI Boss: Novice To Command Line Maestro

���� Introducing the "Kali Linux CLI Boss" Book Bundle: From Novice to Command Line Maestro ���� Are you ready to master......more

OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre

OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre

����️]♂️ OSINT COMMANDO Book Bundle ���� Are you ready to unlock the secrets of the digital world and become a master of......more

Ultimate Splunk for Cybersecurity

Ultimate Splunk for Cybersecurity

Empower Your Digital Shield with Splunk Expertise! Book Description The Ultimate Splunk for Cybersecurity is your practi......more

Blockchain Essentials: Core Concepts and Implementations

Blockchain Essentials: Core Concepts and Implementations

This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concret......more

Blockchain in Healthcare: From Disruption to Integration

Blockchain in Healthcare: From Disruption to Integration

  • Ingram,出版日期:2024-01-04

​Blockchain technology (BT) is quietly transforming the world, from financial infrastructure, to the internet-of-things,......more

Collaborative Approaches for Cyber Security in Cyber-Physical Systems

Collaborative Approaches for Cyber Security in Cyber-Physical Systems

  • Ingram,出版日期:2024-01-04

Deals with collaborative security, a newly developing and promising field. Describes generic techniques as well as their......more

OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng

OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng

Introducing the "OSINT Cracking Tools" Book Bundle Unlock the Power of OSINT with Four Comprehensive Guides Are you read......more

Handbook of Face Recognition: The Deep Neural Network Approach

Handbook of Face Recognition: The Deep Neural Network Approach

  • Ingram,出版日期:2024-01-03

The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a tas......more

Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research

Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research

This book explores the connections between qualitative data reuse, big social research, and data curation. A review of e......more

Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security

Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security

Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle! Are you concerned about the growing threats in the d......more

Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022

Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022

  • Ingram,出版日期:2024-01-03

The book constitutes proceedings of the 12th Industry Symposium held in conjunction with the 18th edition of the Interna......more

Malware Reverse Engineering: Cracking The Code

Malware Reverse Engineering: Cracking The Code

Unlock the Secrets of Malware with "Malware Reverse Engineering: Cracking the Code" - Your Comprehensive Guide to Cybers......more

The Revolution in Quantum Technology: How Game-Changing Tools Are Altering Our World

The Revolution in Quantum Technology: How Game-Changing Tools Are Altering Our World

If you want to learn more about cutting edge quantum technology, read "The Revolution in Quantum Technology: How Game-Ch......more

Proceedings of Data Analytics and Management: Icdam 2023, Volume 4

Proceedings of Data Analytics and Management: Icdam 2023, Volume 4

  • Ingram,出版日期:2023-12-29

This book includes original unpublished contributions presented at the International Conference on Data Analytics and Ma......more

Decision and Game Theory for Security: 14th International Conference, Gamesec 2023, Avignon, France, October 18-20, 2023, Proceedings

Decision and Game Theory for Security: 14th International Conference, Gamesec 2023, Avignon, France, October 18-20, 2023, Proceedings

  • Ingram,出版日期:2023-12-29

This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Secu......more

Machine Learning Security with Azure: Best practices for assessing, securing, and monitoring Azure Machine Learning workloads

Machine Learning Security with Azure: Best practices for assessing, securing, and monitoring Azure Machine Learning workloads

Implement industry best practices to identify vulnerabilities and protect your data, models, environment, and applicatio......more

Gdpr Requirements for Biobanking Activities Across Europe

Gdpr Requirements for Biobanking Activities Across Europe

  • Ingram,出版日期:2023-12-27

The book deals with the effective operation of the rules related to biomedical research and pays attention to the activi......more

Scanning Danger QR Code Frauds

Scanning Danger QR Code Frauds

In the computerized age, QR codes have become pervasive, consistently coordinated into our regular routines. From item m......more

Mike Meyers’ Comptia Security+ Certification Guide, Fourth Edition (Exam Sy0-701)

Mike Meyers’ Comptia Security+ Certification Guide, Fourth Edition (Exam Sy0-701)

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers Take the 2023 version of ......more

Implementing DevSecOps Practices: Supercharge your software security with DevSecOps excellence

Implementing DevSecOps Practices: Supercharge your software security with DevSecOps excellence

Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline......more

Biometric Presentation Attack Detection

Biometric Presentation Attack Detection

Biometrics use an individual’s unique biological identifiers to verify his or her identity. The present technological ev......more

Privacy and Security for Mobile Crowdsourcing

Privacy and Security for Mobile Crowdsourcing

This book is a concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures....more

Ransomware: Penetration Testing and Contingency Planning

Ransomware: Penetration Testing and Contingency Planning

Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware atta......more

Ransomware: Penetration Testing and Contingency Planning

Ransomware: Penetration Testing and Contingency Planning

Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author ......more

Tokenomics Unleashed: FTT And The Future Of Finance

Tokenomics Unleashed: FTT And The Future Of Finance

The introduction of revolutionary blockchain technology has brought about a paradigm shift in the finance industry, ushe......more

Symmetric Cryptography, Volume 1: Design and Security Proofs

Symmetric Cryptography, Volume 1: Design and Security Proofs

  • Ingram,出版日期:2023-12-20

Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Info......more

Privacy Preservation of Genomic and Medical Data

Privacy Preservation of Genomic and Medical Data

PRIVACY PRESERVATION of GENOMIC and MEDICAL DATA Discusses topics concerning the privacy preservation of genomic data in......more

Automated Secure Computing for Next-Generation Systems

Automated Secure Computing for Next-Generation Systems

AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS This book provides cutting-edge chapters on machine-empowered sol......more

The Impact Of Binance On The Cryptocurrency Market

The Impact Of Binance On The Cryptocurrency Market

Binance, a global cryptocurrency exchange platform, has emerged as a transformative force in the ever-evolving landscape......more

Cyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers

Cyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers

���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! �......more

Protecting Information Assets and It Infrastructure in the Cloud

Protecting Information Assets and It Infrastructure in the Cloud

In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificia......more

Protecting Information Assets and It Infrastructure in the Cloud

Protecting Information Assets and It Infrastructure in the Cloud

In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificia......more

Blockchain for Healthcare 4.0: Technology, Challenges, and Applications

Blockchain for Healthcare 4.0: Technology, Challenges, and Applications

  • Ingram,出版日期:2023-12-18

This book presents an overview of the recent advances in blockchain technology which have led to new breakthroughs in th......more

Decentralizing Finance: How Blockchain, Digital Assets and Defi Are Transforming Finance

Decentralizing Finance: How Blockchain, Digital Assets and Defi Are Transforming Finance

"The book examines the current state of DeFi, insofar as the aims of creating a more efficient, interoperable and inclus......more

Cybersecurity in a Devops Environment: From Requirements to Monitoring

Cybersecurity in a Devops Environment: From Requirements to Monitoring

  • Ingram,出版日期:2023-12-16

This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, ver......more

A Nature-Inspired Approach to Cryptology

A Nature-Inspired Approach to Cryptology

This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to g......more

Mathematical Research for Blockchain Economy: 4th International Conference Marble 2023, London, United Kingdom

Mathematical Research for Blockchain Economy: 4th International Conference Marble 2023, London, United Kingdom

  • Ingram,出版日期:2023-12-15

This book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy......more

Malware Science: A comprehensive guide to detection, analysis, and compliance

Malware Science: A comprehensive guide to detection, analysis, and compliance

Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international complianc......more

Mergers & Acquisitions Cybersecurity: The Framework For Maximizing Value

Mergers & Acquisitions Cybersecurity: The Framework For Maximizing Value

In 2016, during its merger with Verizon, Yahoo reported improperly resolved previous cyber incidents, which resulted in ......more

Symmetric Cryptography, Volume 2

Symmetric Cryptography, Volume 2

  • Ingram,出版日期:2023-12-14

Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Info......more

Python 3 and Feature Engineering

Python 3 and Feature Engineering

This book is designed for data scientists, machine learning practitioners, and anyone with a foundational understanding ......more

The Language of Deception: Weaponizing Next Generation AI

The Language of Deception: Weaponizing Next Generation AI

A penetrating look at the dark side of emerging AI technologies In The Language of Deception: Weaponizing Next Generatio......more

How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language

How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language

Every day, thousands of cyberattacks target businesses worldwide. Sooner or later, hackers will infiltrate your systems,......more

Information Systems Security: 19th International Conference, Iciss 2023, Raipur, India, December 16-20, 2023, Proceedings

Information Systems Security: 19th International Conference, Iciss 2023, Raipur, India, December 16-20, 2023, Proceedings

  • Ingram,出版日期:2023-12-09

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICIS......more

Technology of Cybersecurity: An Introduction to Modern Cybersecurity Technologies

Technology of Cybersecurity: An Introduction to Modern Cybersecurity Technologies

The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization’s cy......more

Modern Approaches in Iot and Machine Learning for Cyber Security: Latest Trends in AI

Modern Approaches in Iot and Machine Learning for Cyber Security: Latest Trends in AI

  • Ingram,出版日期:2023-12-08

This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabiliti......more

Demystifying Devsecops in Aws: Achieve Operational Excellence in the Cloud with Devsecops

Demystifying Devsecops in Aws: Achieve Operational Excellence in the Cloud with Devsecops

"Demystifying DevSecOps in AWS" is a practical and insightful handbook designed to empower you in your pursuit of securi......more

Industry 4.0: Technologies, Applications, and Challenges

Industry 4.0: Technologies, Applications, and Challenges

  • Ingram,出版日期:2023-12-08

This book presents Industry 4.0 enabler technologies and tools. It also highlights some of the existing empirical applic......more

Defi and the Future of Finance

Defi and the Future of Finance

During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institu......more

System Reliability and Security: Techniques and Methodologies

System Reliability and Security: Techniques and Methodologies

  • Ingram,出版日期:2023-12-07

Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commission......more

System Reliability and Security: Techniques and Methodologies

System Reliability and Security: Techniques and Methodologies

  • Ingram,出版日期:2023-12-07

Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commission......more

Financial Cryptography and Data Security. FC 2023 International Workshops: Voting, Codecfin, Defi, Wtsc, Bol, Brač, Croatia, May 5, 2023, Revised

Financial Cryptography and Data Security. FC 2023 International Workshops: Voting, Codecfin, Defi, Wtsc, Bol, Brač, Croatia, May 5, 2023, Revised

  • Ingram,出版日期:2023-12-05

​This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference ......more

Blockchains: Decentralized and Verifiable Data Systems

Blockchains: Decentralized and Verifiable Data Systems

This book takes readers through the sensational history of blockchains and their potential to revolutionize database sys......more

System Design Interview Book 2: An Insider’s Guide

System Design Interview Book 2: An Insider’s Guide

���� Navigating the Tech Revolution: Your Comprehensive Guide Step into the future of technology with a book that covers......more

Biosecurity in the Making: The Threats, the Aspects and the Challenge of Readiness

Biosecurity in the Making: The Threats, the Aspects and the Challenge of Readiness

  • Ingram,出版日期:2023-12-01

The explosive growth of bioeconomy and bioscience, coupled with an interconnected planet increases the potential impact ......more

System of Human Activity Systems: A Novel Way to Visualize Invisible Risks

System of Human Activity Systems: A Novel Way to Visualize Invisible Risks

This book has unique features that set it apart from conventional books on the prevention of system failures in that it ......more

Periocular Biometrics for Human Recognition

Periocular Biometrics for Human Recognition

As statistics become additional rife in society, the analysis space is antic- ipated to deal with an ever widening field......more

Federated Learning: Fundamentals and Advances

Federated Learning: Fundamentals and Advances

This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing comm......more

System Design Interview Book 1: An Advanced Insider’s Guide

System Design Interview Book 1: An Advanced Insider’s Guide

���� The Ultimate Guide to System Design Looking to master the art of system design? Dive into this comprehensive guide ......more

83上一頁 1 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類