排序依

共有182

Large Event Security Planning and Emergency Management

Large Event Security Planning and Emergency Management

This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more

Principles of Software Engineering: Secure Software Development

Principles of Software Engineering: Secure Software Development

This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more

Practical Privacy Enhancement Technologies

Practical Privacy Enhancement Technologies

This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more

Fighting the Virus: Disease Modeling and Cyber Security

Fighting the Virus: Disease Modeling and Cyber Security

Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more

Listen and Repair: A Guide for Information Security to Meet Future Demands

Listen and Repair: A Guide for Information Security to Meet Future Demands

An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more

Cryptography: A Very Short Introduction

Cryptography: A Very Short Introduction

Cryptography is a part of everyday life for almost all of us, though we may not realise we’re using it. We are a far cry......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

The Book of Functions: Explore Set Theory, Abstract Algebra, and Category Theory with Functional Progra Mming

Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

In an era where cybersecurity threats are escalating and global regulations are intensifying, the need for a comprehensi......more

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc2)

In an era where cybersecurity threats are escalating and global regulations are intensifying, the need for a comprehensi......more

There’s No Such Thing as Crypto Crime: An Investigators Guide

There’s No Such Thing as Crypto Crime: An Investigators Guide

Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more

Encyclopedia of Cyber Warfare

Encyclopedia of Cyber Warfare

  • Ingram,出版日期:2025-02-06

This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more

Computer Security: A Hands-On Approach (Third Edition)

Computer Security: A Hands-On Approach (Third Edition)

This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations: Fundamentals, Technology and Society

Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more

Introduction to Public Key Cryptography

Introduction to Public Key Cryptography

In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more

Policing Trends and Issues in America

Policing Trends and Issues in America

The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more

Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health

Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health

Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

Modern Cryptography: From Rsa to Zero-Knowledge and Beyond

In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more

Openid Connect in Action

Openid Connect in Action

An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more

Cybersecurity in the Transportation Industry

Cybersecurity in the Transportation Industry

  • Ingram,出版日期:2024-11-20

The movement of people and goods from one location to another has always been essential to human development and surviva......more

Handbook of Trustworthy Federated Learning

Handbook of Trustworthy Federated Learning

  • Ingram,出版日期:2024-11-20

This Handbook aims to serve as a one-stop, reliable resource, including curated surveys and expository contributions on ......more

Quantum Ecology: Why and How New Technologies Will Reshape Societies

Quantum Ecology: Why and How New Technologies Will Reshape Societies

An exploration of the emerging quantum technological paradigm and its effects on human consciousness and cultures. In Qu......more

Cryptography

Cryptography

"An EKS introduction to cryptography from an expert in the field"--...more

Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security

Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security

  • Ingram,出版日期:2024-10-15

Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understandi......more

Three Decades of Consent, Information Privacy and Data Protection: A Machine-Generated Overview

Three Decades of Consent, Information Privacy and Data Protection: A Machine-Generated Overview

  • Ingram,出版日期:2024-10-11

This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more

Computing with Multi-Value Logic in Quantum Dot Cellular Automata

Computing with Multi-Value Logic in Quantum Dot Cellular Automata

Meet the latest challenges in quantum computing with this cutting-edge volume Miniaturization is one of the major forms ......more

The Language of Cyber Attacks: A Rhetoric of Deception

The Language of Cyber Attacks: A Rhetoric of Deception

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more

The Language of Cyber Attacks: A Rhetoric of Deception

The Language of Cyber Attacks: A Rhetoric of Deception

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more

Ai, Blockchain, and Metaverse in Hospitality and Tourism Industry 4.0: Case Studies and Analysis

Ai, Blockchain, and Metaverse in Hospitality and Tourism Industry 4.0: Case Studies and Analysis

  • Ingram,出版日期:2024-10-02

The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality......more

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

  • Ingram,出版日期:2024-09-25

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more

Digital Skill Development for Industry 4.0

Digital Skill Development for Industry 4.0

  • Ingram,出版日期:2024-09-25

The fourth industrial revolution, Industry 4.0 is changing the world, and digital transformation technology tools have i......more

Continuous Auditing with AI in the Public Sector

Continuous Auditing with AI in the Public Sector

  • Ingram,出版日期:2024-09-18

The effectiveness of internal audit activities is important for the sustainability of change in the public sector. In th......more

Cybersecurity in Context: Technology, Policy, and Law

Cybersecurity in Context: Technology, Policy, and Law

The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more

Federated Learning: Unlocking the Power of Collaborative Intelligence

Federated Learning: Unlocking the Power of Collaborative Intelligence

  • Ingram,出版日期:2024-09-16

Federated Learning: Unlocking the Power of Collaborative Intelligence is a definitive guide to the transformative potent......more

Artificial Intelligence Solutions for Cyber-Physical Systems

Artificial Intelligence Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2024-09-13

Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as......more

Synergy of AI and Fintech in the Digital Gig Economy

Synergy of AI and Fintech in the Digital Gig Economy

  • Ingram,出版日期:2024-09-11

The convergence of Artificial Intelligence (AI) and Financial Technology (Fintech) has ushered in a new era of innovatio......more

Evasive Malware

Evasive Malware

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed ......more

Psybersecurity: Human Factors of Cyber Defence

Psybersecurity: Human Factors of Cyber Defence

  • Ingram,出版日期:2024-09-09

Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90% of c......more

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring Ai, Defi, Metaverses, and Nfts in the Crypto Revolution

Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more

Blockchain for Iot Systems: Concept, Framework and Applications

Blockchain for Iot Systems: Concept, Framework and Applications

  • Ingram,出版日期:2024-09-04

Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value......more

Policy as Code: Improving Cloud-Native Security

Policy as Code: Improving Cloud-Native Security

In today’s cloud native world, where we automate as much as possible, everything is code. With this practical guide, you......more

Exploring Intelligent Healthcare with Quantum Computing

Exploring Intelligent Healthcare with Quantum Computing

  • Ingram,出版日期:2024-09-01

This edited book explores the field of quantum computing and machine learning for medical data processing. Topics such a......more

Web3: Blockchain, the New Economy, and the Self-Sovereign Internet

Web3: Blockchain, the New Economy, and the Self-Sovereign Internet

Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA student......more

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom

Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more

Secure Data Mining

Secure Data Mining

Data mining is a process to extract useful knowledge from large amounts of data. To conduct data mining, we often need t......more

Cyber Threat Hunting

Cyber Threat Hunting

Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve......more

The Quantum Evolution: Application of AI and Robotics in the Future of Quantum Technology

The Quantum Evolution: Application of AI and Robotics in the Future of Quantum Technology

  • Ingram,出版日期:2024-08-27

The book offers a comprehensive exploration of the fusion between quantum technology, AI, and robotics, providing reader......more

Smart Healthcare Systems: AI and Iot Perspectives

Smart Healthcare Systems: AI and Iot Perspectives

  • Ingram,出版日期:2024-08-26

Recently, the fields of Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionized numerous indus......more

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

  • Ingram,出版日期:2024-08-26

This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more

Sustainable Development Using Private AI: Security Models and Applications

Sustainable Development Using Private AI: Security Models and Applications

  • Ingram,出版日期:2024-08-20

This book covers the fundamental concepts of private AI and its applications. It also covers fusion of Private AI with c......more

Blockchain Governance

Blockchain Governance

An engaging and comprehensive exploration of how fundamental ideas in political and legal thought shape the governance o......more

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more

Decentralised Music: Exploring Blockchain for Artistic Research

Decentralised Music: Exploring Blockchain for Artistic Research

  • Ingram,出版日期:2024-08-14

This book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practice......more

Decentralised Music: Exploring Blockchain for Artistic Research

Decentralised Music: Exploring Blockchain for Artistic Research

  • Ingram,出版日期:2024-08-14

This book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practice......more

Cyber Warfare: A Reference Handbook

Cyber Warfare: A Reference Handbook

"An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of its u......more

A Study of Statistical Zero-Knowledge Proofs

A Study of Statistical Zero-Knowledge Proofs

The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer......more

Optimum Spending on Cybersecurity Measures: Digital Privacy and Data Protection

Optimum Spending on Cybersecurity Measures: Digital Privacy and Data Protection

The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more

The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet

The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet

A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Agai......more

Digital Technology Enabled Circular Economy: Models for Environmental and Resource Sustainability

Digital Technology Enabled Circular Economy: Models for Environmental and Resource Sustainability

  • Ingram,出版日期:2024-08-01

This book presents cutting-edge findings that draw on the use of AI, the Industrial Internet of Things, Blockchain, and ......more

Attack-And-Defense Games for Control Systems: Analysis and Synthesis

Attack-And-Defense Games for Control Systems: Analysis and Synthesis

This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical net......more

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more

Research Advances in Intelligent Computing (Volume 2)

Research Advances in Intelligent Computing (Volume 2)

  • Ingram,出版日期:2024-07-26

As the computers and other machines have been developed, researchers and scientists have worked very hard to increase th......more

Secure and Smart Cyber-Physical Systems

Secure and Smart Cyber-Physical Systems

  • Ingram,出版日期:2024-07-24

Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the interc......more

21 2 下一頁 跳到

外文書書籍分類

縮小搜尋範圍

依出版日期搜尋

依購買狀態搜尋