排序依

共有9111

The Adoption of Fintech: Using Technology for Better Security, Speed, and Customer Experience in Finance

The Adoption of Fintech: Using Technology for Better Security, Speed, and Customer Experience in Finance

  • Ingram,出版日期:2024-06-19

The term Fintech is a combination of the words "financial" and "technology," which is now a real business need. However,......more

The Adoption of Fintech: Using Technology for Better Security, Speed, and Customer Experience in Finance

The Adoption of Fintech: Using Technology for Better Security, Speed, and Customer Experience in Finance

  • Ingram,出版日期:2024-06-19

The term Fintech is a combination of the words "financial" and "technology," which is now a real business need. However,......more

Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research

Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research

  • Ingram,出版日期:2024-06-14

An unfortunate outcome of the growth of the internet and mobile technologies has been the challenge of countering cyberc......more

Blockchains in 6g: A Standardized Approach to Permissioned Distributed Ledgers

Blockchains in 6g: A Standardized Approach to Permissioned Distributed Ledgers

Based on work done within ETSI, this comprehensive guide dives deep into the heart of blockchains and their imminent int......more

Screening by International Aid Organizations Operating in the Global South: Mitigating Risks of Generosity

Screening by International Aid Organizations Operating in the Global South: Mitigating Risks of Generosity

Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing......more

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

  • Ingram,出版日期:2024-06-07

This book is an introductory account for policy makers, academia and interested readers on the digital technologies on I......more

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

  • Ingram,出版日期:2024-06-07

This book is an introductory account for policy makers, academia and interested readers on the digital technologies on I......more

Intelligent Strategies for ICT: Proceedings of Ictcs 2023, Volume 2

Intelligent Strategies for ICT: Proceedings of Ictcs 2023, Volume 2

  • Ingram,出版日期:2024-06-05

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Understanding Cryptography: A Textbook for Students and Practitioners

Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banki......more

Social Engineering in Cybersecurity: Threats and Defenses

Social Engineering in Cybersecurity: Threats and Defenses

  • Ingram,出版日期:2024-06-03

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical ......more

The New Quantum Mechanics

The New Quantum Mechanics

The New Quantum Mechanics is a forward-thinking exploration into the rapidly evolving field of quantum mechanics. It off......more

Cyber Resilience Fundamentals

Cyber Resilience Fundamentals

This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT se......more

Elliptic Curve Cryptography for Developers

Elliptic Curve Cryptography for Developers

Learn how to implement smaller, more secure public key protocols with this accessible guide to Elliptic Curve Cryptograp......more

The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age

The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age

The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Draw......more

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

  • Ingram,出版日期:2024-05-26

This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary a......more

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

  • Ingram,出版日期:2024-05-26

This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary a......more

Ict: Applications and Social Interfaces: Proceedings of Ictcs 2023, Volume 1

Ict: Applications and Social Interfaces: Proceedings of Ictcs 2023, Volume 1

  • Ingram,出版日期:2024-05-23

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything

Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything

NEW YORK TIMES BESTSELLER - An exhilarating tour of humanity’s next great technological achievement--quantum computing--......more

Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banki......more

Robust Machine Learning: Distributed Methods for Safe AI

Robust Machine Learning: Distributed Methods for Safe AI

Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more

Information Technology Security and Risk Management: Inductive Cases for Information Security

Information Technology Security and Risk Management: Inductive Cases for Information Security

  • Ingram,出版日期:2024-05-16

Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases ......more

The Comprehensive Guide to Cybersecurity Careers: A Professional’s Roadmap for the Digital Security Age

The Comprehensive Guide to Cybersecurity Careers: A Professional’s Roadmap for the Digital Security Age

The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity p......more

The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices

The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices

This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and ins......more

Ict: Cyber Security and Applications: Proceedings of Ictcs 2023, Volume 3

Ict: Cyber Security and Applications: Proceedings of Ictcs 2023, Volume 3

  • Ingram,出版日期:2024-05-13

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

  • Ingram,出版日期:2024-05-11

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more

Managing It Service Security: Methods and Recipes for User Organizations and Providers Along the Supply Chain

Managing It Service Security: Methods and Recipes for User Organizations and Providers Along the Supply Chain

This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It co......more

Grokking Web Application Security

Grokking Web Application Security

When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can st......more

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

  • Ingram,出版日期:2024-05-06

This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more

Data-Centric Security in Software Defined Networks (Sdn)

Data-Centric Security in Software Defined Networks (Sdn)

The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more

Randomized Response Techniques: Certain Thought-Provoking Aspects

Randomized Response Techniques: Certain Thought-Provoking Aspects

This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more

The Zero Trust Framework and Privileged Access Management (Pam)

The Zero Trust Framework and Privileged Access Management (Pam)

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more

The Zero Trust Framework and Privileged Access Management (Pam)

The Zero Trust Framework and Privileged Access Management (Pam)

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more

Cyber Operations: A Case Study Approach

Cyber Operations: A Case Study Approach

A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolut......more

Windows Security Internals with Powershell

Windows Security Internals with Powershell

Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulner......more

Modern Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem

Modern Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem

Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerabil......more

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more

Blockchain-Based Cyber Security: Applications and Paradigms

Blockchain-Based Cyber Security: Applications and Paradigms

  • Ingram,出版日期:2024-04-29

The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber s......more

Responsible, Transparent, and Trustworthy AI Systems

Responsible, Transparent, and Trustworthy AI Systems

Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications,......more

Information Technology Security: Modern Trends and Challenges

Information Technology Security: Modern Trends and Challenges

  • Ingram,出版日期:2024-04-25

This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more

The Right to Privacy 1914-1948: The Lost Years

The Right to Privacy 1914-1948: The Lost Years

The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by t......more

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back

"A Hacker’s Mind...sheds vital light on the beginnings of our journey into an increasingly complex world." --Financial T......more

Generative AI Security: Theories and Practices

Generative AI Security: Theories and Practices

  • Ingram,出版日期:2024-04-22

This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more

Intelligent Security Solutions for Cyber-Physical Systems

Intelligent Security Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2024-04-22

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more

Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications

Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications

This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in co......more

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more

Guide to Computer Network Security

Guide to Computer Network Security

This important text/reference presents a comprehensive guide to the field of computing and information security and assu......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Advances in Emerging Financial Technology & Digital Money

Advances in Emerging Financial Technology & Digital Money

  • Ingram,出版日期:2024-03-29

Advances in Emerging Financial Technology and Digital Money provide a platform for collective reflection, bringing toget......more

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more

Blockchain-Based Internet of Things: Opportunities, Challenges and Solutions

Blockchain-Based Internet of Things: Opportunities, Challenges and Solutions

  • Ingram,出版日期:2024-03-28

This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challen......more

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

  • Ingram,出版日期:2024-03-26

To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats

  • Ingram,出版日期:2024-03-26

To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspe......more

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecur......more

Database and Application Security: A Practitioners Guide

Database and Application Security: A Practitioners Guide

An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the ave......more

The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects

The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects

This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer In......more

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I

  • Ingram,出版日期:2024-03-20

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II

  • Ingram,出版日期:2024-03-20

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more

Smart Edge Computing: An Operation Research Perspective

Smart Edge Computing: An Operation Research Perspective

  • Ingram,出版日期:2024-03-19

This book pioneers the synergy between state-of-the-art edge computing technologies and the power of operations research......more

Blockchain and Dlt: A Comprehensive Guide to Getting Started with Blockchain and Web3

Blockchain and Dlt: A Comprehensive Guide to Getting Started with Blockchain and Web3

Blockchain secures individual transactions with cryptography, creating a tamper-proof chain. In contrast, distributed le......more

Locksport

Locksport

A comprehensive, fully illustrated guide to the fascinating sport of picking locks, Locksport is authored by five of the......more

92上一頁 1 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類