排序依

共有9111

Large Event Security Planning and Emergency Management

Large Event Security Planning and Emergency Management

This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more

Principles of Software Engineering: Secure Software Development

Principles of Software Engineering: Secure Software Development

This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Fighting the Virus: Disease Modeling and Cyber Security

Fighting the Virus: Disease Modeling and Cyber Security

Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more

Listen and Repair: A Guide for Information Security to Meet Future Demands

Listen and Repair: A Guide for Information Security to Meet Future Demands

An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

There’s No Such Thing as Crypto Crime: An Investigators Guide

There’s No Such Thing as Crypto Crime: An Investigators Guide

Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more

Introduction to Public Key Cryptography

Introduction to Public Key Cryptography

In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more

Policing Trends and Issues in America

Policing Trends and Issues in America

The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more

Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health

Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health

Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more

Encyclopedia of Cyber Warfare

Encyclopedia of Cyber Warfare

  • Ingram,出版日期:2024-12-12

This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Gro e Berühmtheit......more

Openid Connect in Action

Openid Connect in Action

An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more

Cryptography

Cryptography

A broad introduction to cryptography--what it is, how it really works, what its future holds, and why every informed cit......more

Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security

Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security

  • Ingram,出版日期:2024-10-15

Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more

Three Decades of Consent, Information Privacy and Data Protection: A Machine-Generated Overview

Three Decades of Consent, Information Privacy and Data Protection: A Machine-Generated Overview

  • Ingram,出版日期:2024-10-11

This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more

The Language of Cyber Attacks: A Rhetoric of Deception

The Language of Cyber Attacks: A Rhetoric of Deception

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more

The Language of Cyber Attacks: A Rhetoric of Deception

The Language of Cyber Attacks: A Rhetoric of Deception

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more

Cybersecurity in Context: Technology, Policy, and Law

Cybersecurity in Context: Technology, Policy, and Law

The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more

Evasive Malware

Evasive Malware

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed ......more

Policy as Code: Improving Cloud-Native Security

Policy as Code: Improving Cloud-Native Security

In today’s cloud native world, where we automate as much as possible, everything is code. With this practical guide, you......more

Computer Security: A Hands-On Approach (Third Edition)

Computer Security: A Hands-On Approach (Third Edition)

This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more

Web3: Blockchain, the New Economy, and the Self-Sovereign Internet

Web3: Blockchain, the New Economy, and the Self-Sovereign Internet

Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA student......more

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more

Secure Data Mining

Secure Data Mining

Data mining is a process to extract useful knowledge from large amounts of data. To conduct data mining, we often need t......more

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more

Cyber Threat Hunting

Cyber Threat Hunting

Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve......more

The Quantum Evolution: Application of AI and Robotics in the Future of Quantum Technology

The Quantum Evolution: Application of AI and Robotics in the Future of Quantum Technology

  • Ingram,出版日期:2024-08-27

The book offers a comprehensive exploration of the fusion between quantum technology, AI, and robotics, providing reader......more

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

  • Ingram,出版日期:2024-08-26

This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

  • Ingram,出版日期:2024-08-26

This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more

Smart Healthcare Systems: AI and Iot Perspectives

Smart Healthcare Systems: AI and Iot Perspectives

  • Ingram,出版日期:2024-08-21

Recently, the fields of Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionized numerous indus......more

Blockchain Governance

Blockchain Governance

An engaging and comprehensive exploration of how fundamental ideas in political and legal thought shape the governance o......more

Decentralised Music: Exploring Blockchain for Artistic Research

Decentralised Music: Exploring Blockchain for Artistic Research

  • Ingram,出版日期:2024-08-14

This book offers a thorough examination of the potential of blockchain to transform musical practices. Moving beyond blo......more

Decentralised Music: Exploring Blockchain for Artistic Research

Decentralised Music: Exploring Blockchain for Artistic Research

  • Ingram,出版日期:2024-08-14

This book offers a thorough examination of the potential of blockchain to transform musical practices. Moving beyond blo......more

Optimum Spending on Cybersecurity Measures: Digital Privacy and Data Protection

Optimum Spending on Cybersecurity Measures: Digital Privacy and Data Protection

The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more

A Study of Statistical Zero-Knowledge Proofs

A Study of Statistical Zero-Knowledge Proofs

The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer......more

The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet

The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet

A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Agai......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more

Attack-And-Defense Games for Control Systems: Analysis and Synthesis

Attack-And-Defense Games for Control Systems: Analysis and Synthesis

This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical net......more

Digital Technology Enabled Circular Economy: Models for Environmental and Resource Sustainability

Digital Technology Enabled Circular Economy: Models for Environmental and Resource Sustainability

  • Ingram,出版日期:2024-08-01

This book presents cutting-edge findings that draw on the use of AI, the Industrial Internet of Things, Blockchain, and ......more

Learning Devsecops: A Practical Guide to Processes and Tools

Learning Devsecops: A Practical Guide to Processes and Tools

How can organizations integrate security while continuously deploying new features? How can some maintain 24-7-365 opera......more

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more

Research Advances in Intelligent Computing (Volume 2)

Research Advances in Intelligent Computing (Volume 2)

  • Ingram,出版日期:2024-07-26

As the computers and other machines have been developed, researchers and scientists have worked very hard to increase th......more

Secure and Smart Cyber-Physical Systems

Secure and Smart Cyber-Physical Systems

  • Ingram,出版日期:2024-07-24

Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the interc......more

Engineering Secure Devices

Engineering Secure Devices

This practical guide to building embedded and IoT devices securely is an essential resource for current and future devel......more

Developing a Security Training Program

Developing a Security Training Program

Developing a Security Training Program focuses on how to establish a comprehensive training program for a security depar......more

Developing a Security Training Program

Developing a Security Training Program

Developing a Security Training Program focuses on how to establish a comprehensive training program for a security depar......more

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regu......more

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

The Shortest Hour: An Applied Approach to Boardroom Governance of Cybersecurity

Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regu......more

Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications

Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications

This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in co......more

Crypto Millionaires: Blockchain: A Chance for All?

Crypto Millionaires: Blockchain: A Chance for All?

Blockchain: The Key to the World of Cryptocurrencies. A word that sounds like a promise of wealth. But what exactly is B......more

Crypto Millionaires: Blockchain: A Chance for All?

Crypto Millionaires: Blockchain: A Chance for All?

Blockchain: The Key to the World of Cryptocurrencies. A word that sounds like a promise of wealth. But what exactly is B......more

Cyber Warfare: A Reference Handbook

Cyber Warfare: A Reference Handbook

"An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of its u......more

Crypto Confidential: Winning and Losing Millions in the New Frontier of Finance

Crypto Confidential: Winning and Losing Millions in the New Frontier of Finance

THE WILD INSIDE STORY OF CRYPTO’S GET-RICH-QUICK UNDERBELLY Nat Eliason had six months to make as much money as possible......more

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

  • Ingram,出版日期:2024-06-30

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

  • Ingram,出版日期:2024-06-28

With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digit......more

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

  • Ingram,出版日期:2024-06-27

Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the most c......more

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

Handbook of Global Terrorist and Insurgent Groups: Tactics, Strategies, and Organization

  • Ingram,出版日期:2024-06-27

Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the most c......more

Advanced Techniques and Applications of Cybersecurity and Forensics

Advanced Techniques and Applications of Cybersecurity and Forensics

  • Ingram,出版日期:2024-06-21

The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It......more

921 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類