排序依

共有186

Large Event Security Planning and Emergency Management

Large Event Security Planning and Emergency Management

This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more

Principles of Software Engineering: Secure Software Development

Principles of Software Engineering: Secure Software Development

This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Fighting the Virus: Disease Modeling and Cyber Security

Fighting the Virus: Disease Modeling and Cyber Security

Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more

Listen and Repair: A Guide for Information Security to Meet Future Demands

Listen and Repair: A Guide for Information Security to Meet Future Demands

An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Computer Security: A Hands-On Approach (Third Edition)

Computer Security: A Hands-On Approach (Third Edition)

This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more

There’s No Such Thing as Crypto Crime: An Investigators Guide

There’s No Such Thing as Crypto Crime: An Investigators Guide

Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more

Encyclopedia of Cyber Warfare

Encyclopedia of Cyber Warfare

  • Ingram,出版日期:2025-02-06

This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more

Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms

Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms

  • Ingram,出版日期:2025-02-05

A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widespread term for the com......more

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more

Three Decades of Consent, Information Privacy and Data Protection: A Machine-Generated Overview

Three Decades of Consent, Information Privacy and Data Protection: A Machine-Generated Overview

  • Ingram,出版日期:2025-01-11

This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more

Introduction to Public Key Cryptography

Introduction to Public Key Cryptography

In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more

Policing Trends and Issues in America

Policing Trends and Issues in America

The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more

Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health

Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health

Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more

Lattice-Based Cryptography: From Theory to Practice

Lattice-Based Cryptography: From Theory to Practice

  • Ingram,出版日期:2024-12-11

Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more

Cryptopunks: Free to Claim

Cryptopunks: Free to Claim

  • Ingram,出版日期:2024-12-10

A comprehensive monograph chronicling the phenomenal rise of CryptoPunks - one of the world’s first and most sought-afte......more

Information Technology for Peace and Security: It Applications and Infrastructures in Conflicts, Crises, War, and Peace

Information Technology for Peace and Security: It Applications and Infrastructures in Conflicts, Crises, War, and Peace

  • Ingram,出版日期:2024-12-06

This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topi......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more

Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities

Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities

  • Ingram,出版日期:2024-12-03

Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities presents the applications of the hea......more

Big Data and Blockchain Technology for Secure Iot Applications

Big Data and Blockchain Technology for Secure Iot Applications

  • Ingram,出版日期:2024-11-27

Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more

Openid Connect in Action

Openid Connect in Action

An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more

Securing the Software Supply Chain: Protect Your Application Development Lifecycle

Securing the Software Supply Chain: Protect Your Application Development Lifecycle

Secure your entire software supply chain, including the code you write, the libraries you use, and the platforms you run......more

The Ciso Playbook

The Ciso Playbook

A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more

The Ciso Playbook

The Ciso Playbook

A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more

Generative AI and Cyberbullying

Generative AI and Cyberbullying

Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly ever since them. For example......more

Generative AI and Cyberbullying

Generative AI and Cyberbullying

Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly ever since them. For example......more

Quantum Ecology: Why and How New Technologies Will Reshape Societies

Quantum Ecology: Why and How New Technologies Will Reshape Societies

An exploration of the emerging quantum technological paradigm and its effects on human consciousness and cultures. In Qu......more

Secure Health: A Guide to Cybersecurity for Healthcare Managers

Secure Health: A Guide to Cybersecurity for Healthcare Managers

  • Ingram,出版日期:2024-11-06

In today’s interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient ......more

Zero to Hero: Your Guide to a Career in Cybersecurity

Zero to Hero: Your Guide to a Career in Cybersecurity

"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibra......more

Zero to Hero: Your Guide to a Career in Cybersecurity

Zero to Hero: Your Guide to a Career in Cybersecurity

"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibra......more

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more

Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape

Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape

’Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expa......more

Optimal Spending on Cybersecurity Measures: Protecting Health Information

Optimal Spending on Cybersecurity Measures: Protecting Health Information

The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment ......more

Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape

Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape

’Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expa......more

Optimal Spending on Cybersecurity Measures: Protecting Health Information

Optimal Spending on Cybersecurity Measures: Protecting Health Information

The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment ......more

Blockchain Technology in the Automotive Industry

Blockchain Technology in the Automotive Industry

  • Ingram,出版日期:2024-10-30

Nowadays, the latest technologies can be found not only in healthcare and space application but also in hybrid supercars......more

How to Spot a Cyborg: Stopping the Hidden Augmented Human Cyber Threat

How to Spot a Cyborg: Stopping the Hidden Augmented Human Cyber Threat

Discover the future of cybersecurity through the eyes of the world’s first augmented ethical hacker In Human Hacked: My ......more

Medical Knowledge Paradigms for Enabling the Digital Health Ecosystem

Medical Knowledge Paradigms for Enabling the Digital Health Ecosystem

  • Ingram,出版日期:2024-10-28

In the era of digital transformation, the landscape of healthcare is undergoing a profound paradigm shift, driven by tec......more

Data Analytics and Artificial Intelligence for Predictive Maintenance in Smart Manufacturing

Data Analytics and Artificial Intelligence for Predictive Maintenance in Smart Manufacturing

  • Ingram,出版日期:2024-10-21

In this smart era, Data Analytics and Artificial Intelligence (AI) play an important role in Predictive Maintenance (PdM......more

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understandi......more

Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security

Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security

  • Ingram,出版日期:2024-10-15

Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more

Cybersecurity in Context: Technology, Policy, and Law

Cybersecurity in Context: Technology, Policy, and Law

The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more

Computing with Multi-Value Logic in Quantum Dot Cellular Automata

Computing with Multi-Value Logic in Quantum Dot Cellular Automata

Meet the latest challenges in quantum computing with this cutting-edge volume Miniaturization is one of the major forms ......more

Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions

Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions

  • Ingram,出版日期:2024-10-07

In the ever-evolving landscape of digital forensics and cyber-crime investigation, staying ahead with the latest advance......more

Unlocking Quantum Information Technology: Opportunities for Business and Management

Unlocking Quantum Information Technology: Opportunities for Business and Management

  • Ingram,出版日期:2024-10-04

This book explores the dynamic intersection of quantum computing and management strategy, offering an exploration of thi......more

The Language of Cyber Attacks: A Rhetoric of Deception

The Language of Cyber Attacks: A Rhetoric of Deception

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more

The Language of Cyber Attacks: A Rhetoric of Deception

The Language of Cyber Attacks: A Rhetoric of Deception

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more

Ai, Blockchain, and Metaverse in Hospitality and Tourism Industry 4.0: Case Studies and Analysis

Ai, Blockchain, and Metaverse in Hospitality and Tourism Industry 4.0: Case Studies and Analysis

  • Ingram,出版日期:2024-10-01

The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality......more

Cybersecurity, Law and Economics: The Case of India

Cybersecurity, Law and Economics: The Case of India

  • Ingram,出版日期:2024-10-01

This book examines the intersection between cybersecurity and the law and economy of India, and offers a course of actio......more

Synergy of AI and Fintech in the Digital Gig Economy

Synergy of AI and Fintech in the Digital Gig Economy

  • Ingram,出版日期:2024-09-30

The convergence of Artificial Intelligence (AI) and Financial Technology (Fintech) has ushered in a new era of innovatio......more

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

  • Ingram,出版日期:2024-09-26

The Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the mo......more

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

  • Ingram,出版日期:2024-09-26

The Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the mo......more

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

  • Ingram,出版日期:2024-09-25

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more

Practical Cyber Intelligence: A Hands-On Guide to Digital Forensics

Practical Cyber Intelligence: A Hands-On Guide to Digital Forensics

Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative pro......more

Optimum Spending on Cybersecurity Measures: Digital Privacy and Data Protection

Optimum Spending on Cybersecurity Measures: Digital Privacy and Data Protection

The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more

Digital Skill Development for Industry 4.0

Digital Skill Development for Industry 4.0

  • Ingram,出版日期:2024-09-23

The fourth industrial revolution, Industry 4.0 is changing the world, and digital transformation technology tools have i......more

Continuous Auditing with AI in the Public Sector

Continuous Auditing with AI in the Public Sector

  • Ingram,出版日期:2024-09-18

The effectiveness of internal audit activities is important for the sustainability of change in the public sector. In th......more

Artificial Intelligence Solutions for Cyber-Physical Systems

Artificial Intelligence Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2024-09-13

Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as......more

Paradigms on Technology Development for Security Practitioners

Paradigms on Technology Development for Security Practitioners

​This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, ......more

Federated Learning: Unlocking the Power of Collaborative Intelligence

Federated Learning: Unlocking the Power of Collaborative Intelligence

  • Ingram,出版日期:2024-09-12

Federated Learning: Unlocking the Power of Collaborative Intelligence is a definitive guide to the transformative potent......more

Universal Threats in Expert Applications and Solutions: Proceedings of 3rd Uni-Teas 2024, Volume 1

Universal Threats in Expert Applications and Solutions: Proceedings of 3rd Uni-Teas 2024, Volume 1

  • Ingram,出版日期:2024-09-12

This book presents high-quality, peer-reviewed papers from 3rd International Conference on "Universal Threats in Expert ......more

Introduction to Biometrics

Introduction to Biometrics

This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioner......more

21 2 下一頁 跳到

外文書書籍分類

縮小搜尋範圍

依出版日期搜尋

依價格帶搜尋

依購買狀態搜尋