HOT YLE英檢

排序依

共有8221

Cyber Operations: A Case Study Approach

Cyber Operations: A Case Study Approach

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more

The Right to Privacy 1914-1948: The Lost Years

The Right to Privacy 1914-1948: The Lost Years

The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by t......more

Homeland and territorial security with AI: Aitek 6 knowledge cartridge

Homeland and territorial security with AI: Aitek 6 knowledge cartridge

This book explores the innovative concept of a knowledge cartridge dedicated to internal and territorial security, emplo......more

Intelligent Security Solutions for Cyber-Physical Systems

Intelligent Security Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2024-04-22

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more

High Performance Privacy Preserving AI

High Performance Privacy Preserving AI

Intended for researchers in academia and R&D engineers in industry, this book explains how advances in three areas--AI, ......more

Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices

Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices

In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management -- includ......more

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

  • Ingram,出版日期:2024-04-18

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

  • Ingram,出版日期:2024-04-17

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more

The Native-Born: The First White Australians

The Native-Born: The First White Australians

The story of white Australians born in this land before 1850; most were the children of convicts, had no access to land ......more

Data-Centric Security in Software Defined Networks (Sdn)

Data-Centric Security in Software Defined Networks (Sdn)

The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more

Guide to Computer Network Security

Guide to Computer Network Security

This important text/reference presents a comprehensive guide to the field of computing and information security and assu......more

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the "internet of Things"

This comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises......more

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

  • Ingram,出版日期:2024-04-09

This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more

The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology

The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology

In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and ......more

Generative AI Security: Theories and Practices

Generative AI Security: Theories and Practices

  • Ingram,出版日期:2024-04-06

This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more

Blockchain Driven Supply Chain Management: A Multi-Dimensional Perspective

Blockchain Driven Supply Chain Management: A Multi-Dimensional Perspective

  • Ingram,出版日期:2024-04-06

The book aims to present a multi-dimensional view on the blockchain-driven supply chain management and its linkage with ......more

Robust Machine Learning: Distributed Methods for Safe AI

Robust Machine Learning: Distributed Methods for Safe AI

Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

This book introduces some fundamentals of information and communication technology (ICT) and other current and future te......more

Information Technology Security: Modern Trends and Challenges

Information Technology Security: Modern Trends and Challenges

  • Ingram,出版日期:2024-04-02

This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more

Blockchain Applications in Food Supply Chain Management: Case Studies and Implications

Blockchain Applications in Food Supply Chain Management: Case Studies and Implications

This book contributes to blockchain applications in food supply chain management from both theoretical and practical per......more

Memory Dump Analysis Anthology, Volume 15

Memory Dump Analysis Anthology, Volume 15

This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from S......more

Randomized Response Techniques: Certain Thought-Provoking Aspects

Randomized Response Techniques: Certain Thought-Provoking Aspects

This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more

Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain

Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain

Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications w......more

Advances in Emerging Financial Technology & Digital Money

Advances in Emerging Financial Technology & Digital Money

  • Ingram,出版日期:2024-03-29

Advances in Emerging Financial Technology and Digital Money provide a platform for collective reflection, bringing toget......more

The OSINT Handbook: A practical guide to gathering and analyzing online information

The OSINT Handbook: A practical guide to gathering and analyzing online information

Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more

Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks

Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks

Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehe......more

Quantum Mechanics: A Concise Introduction

Quantum Mechanics: A Concise Introduction

This textbook highlights a concise introduction to quantum mechanics in a readable and serious manner. Being readable, t......more

Blockchain-Based Internet of Things: Opportunities, Challenges and Solutions

Blockchain-Based Internet of Things: Opportunities, Challenges and Solutions

  • Ingram,出版日期:2024-03-28

This reference text presents an overview of the blockchain-based internet of things systems, along with the opportunitie......more

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspe......more

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

  • Ingram,出版日期:2024-03-26

To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

  • Ingram,出版日期:2024-03-26

To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecur......more

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks

This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversari......more

Bitcoin Development Philosophy

Bitcoin Development Philosophy

Bitcoin Development Philosophy is a comprehensive guide aimed at developers who have a foundational understanding of Bit......more

Database and Application Security: A Practitioners Guide

Database and Application Security: A Practitioners Guide

An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the ave......more

Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications

Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications

This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in co......more

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I

  • Ingram,出版日期:2024-03-20

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II

  • Ingram,出版日期:2024-03-20

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more

The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects

The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects

This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer In......more

Locksport

Locksport

A comprehensive, fully illustrated guide to the fascinating sport of picking locks, Locksport is authored by five of the......more

Blockchain and Dlt: A Comprehensive Guide to Getting Started with Blockchain and Web3

Blockchain and Dlt: A Comprehensive Guide to Getting Started with Blockchain and Web3

Blockchain secures individual transactions with cryptography, creating a tamper-proof chain. In contrast, distributed le......more

Smart Edge Computing: An Operation Research Perspective

Smart Edge Computing: An Operation Research Perspective

  • Ingram,出版日期:2024-03-19

This book pioneers the synergy between state-of-the-art edge computing technologies and the power of operations research......more

Critical Infrastructure Protection in the Light of the Armed Conflicts

Critical Infrastructure Protection in the Light of the Armed Conflicts

  • Ingram,出版日期:2024-03-16

This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflic......more

Beyond the Blocks: Understanding Layer 2 in Blockchain

Beyond the Blocks: Understanding Layer 2 in Blockchain

In the ever-evolving world of cryptocurrency, scalability has emerged as one of the most pressing challenges. As the num......more

Ict: Smart Systems and Technologies: Proceedings of Ictcs 2023, Volume 4

Ict: Smart Systems and Technologies: Proceedings of Ictcs 2023, Volume 4

  • Ingram,出版日期:2024-03-16

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Cyber Resilience Fundamentals

Cyber Resilience Fundamentals

This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT se......more

Quantum Computing and Information: A Scaffolding Approach

Quantum Computing and Information: A Scaffolding Approach

Unlock the Potential of Quantum Computing This expertly crafted guide demystifies the complexities of quantum computing ......more

Quantum Computing and Information: A Scaffolding Approach

Quantum Computing and Information: A Scaffolding Approach

Unlock the Potential of Quantum Computing This expertly crafted guide demystifies the complexities of quantum computing ......more

Optimum Spending on Cybersecurity Measures: Devops

Optimum Spending on Cybersecurity Measures: Devops

This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more

Optimum Spending on Cybersecurity Measures: Devops

Optimum Spending on Cybersecurity Measures: Devops

This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more

Ubiquitous Security: Third International Conference, Ubisec 2023, Exeter, Uk, November 1-3, 2023, Revised Selected Papers

Ubiquitous Security: Third International Conference, Ubisec 2023, Exeter, Uk, November 1-3, 2023, Revised Selected Papers

  • Ingram,出版日期:2024-03-13

This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during Nov......more

Werewolf at Dusk: Stories

Werewolf at Dusk: Stories

Long celebrated as a modern master of graphic literature, David Small has elicited in his work comparisons to Stan Lee a......more

Security and Privacy in Federated Learning

Security and Privacy in Federated Learning

In this book, the authors highlight the latest research findings on the security and privacy of federated learning syste......more

Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars

Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars

It is unclear if U.S. policy makers and military leaders fully realize that we have already been thrust into an artifici......more

Why Cisos Fail

Why Cisos Fail

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a......more

Why Cisos Fail

Why Cisos Fail

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a......more

Once Upon Tomorrow: Harnessing the New Opportunities the Metaverse Creates

Once Upon Tomorrow: Harnessing the New Opportunities the Metaverse Creates

Shurick Agapitov’s Once Upon Tomorrow unpacks the sometimes vague concept of the metaverse and shares the opportunities ......more

Quantum Technology: The Power to Disrupt the Future

Quantum Technology: The Power to Disrupt the Future

Quantum Technology: The Power to Disrupt the Future is a trailblazing exploration of the quantum revolution poised to tr......more

Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security

Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security

A practical guide to deploying, managing, and leveraging the power of Microsoft’s unified security solution Key Features......more

ABC - Ai, Blockchain, and Cybersecurity for Healthcare: New Innovations for the Post-Quantum Era

ABC - Ai, Blockchain, and Cybersecurity for Healthcare: New Innovations for the Post-Quantum Era

  • Ingram,出版日期:2024-02-28

Join us in the beginning of a conversation and what we hope will be a community dedicated to leveraging some of the late......more

ABC - Ai, Blockchain, and Cybersecurity for Healthcare: New Innovations for the Post-Quantum Era

ABC - Ai, Blockchain, and Cybersecurity for Healthcare: New Innovations for the Post-Quantum Era

  • Ingram,出版日期:2024-02-28

Join us in the beginning of a conversation and what we hope will be a community dedicated to leveraging some of the late......more

Pen Testing from Contract to Report

Pen Testing from Contract to Report

Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests,......more

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

How can you manage the complex threats that can cause financial, operational and reputational damage to the business? Th......more

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

How can you manage the complex threats that can cause financial, operational and reputational damage to the business? Th......more

Web Application Security: Exploitation and Countermeasures for Modern Web Applications

Web Application Security: Exploitation and Countermeasures for Modern Web Applications

In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security......more

Security Without Obscurity: A Guide to Pki Operations

Security Without Obscurity: A Guide to Pki Operations

Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information techn......more

Security Without Obscurity: A Guide to Pki Operations

Security Without Obscurity: A Guide to Pki Operations

Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information techn......more

Secure Coding Practices: Fortifying Applications Against Cyber Threats

Secure Coding Practices: Fortifying Applications Against Cyber Threats

Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the import......more

The Business of Cyber: Why You Should Question What Your Security Team Are Telling You

The Business of Cyber: Why You Should Question What Your Security Team Are Telling You

This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitione......more

83上一頁 1 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類