排序依

共有49

Blockchain-Based Cyber Security: Applications and Paradigms

Blockchain-Based Cyber Security: Applications and Paradigms

  • Ingram,出版日期:2024-04-29

The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber s......more

Responsible, Transparent, and Trustworthy AI Systems

Responsible, Transparent, and Trustworthy AI Systems

This book provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the fie......more

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back

"A Hacker’s Mind...sheds vital light on the beginnings of our journey into an increasingly complex world." --Financial T......more

Cyber Operations: A Case Study Approach

Cyber Operations: A Case Study Approach

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more

The Right to Privacy 1914-1948: The Lost Years

The Right to Privacy 1914-1948: The Lost Years

The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by t......more

Intelligent Security Solutions for Cyber-Physical Systems

Intelligent Security Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2024-04-22

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

  • Ingram,出版日期:2024-04-18

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

  • Ingram,出版日期:2024-04-17

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more

The Native-Born: The First White Australians

The Native-Born: The First White Australians

The native-born . . . have walked constantly with me, but only as shadows. In libraries and manuscript rooms, in the fad......more

Data-Centric Security in Software Defined Networks (Sdn)

Data-Centric Security in Software Defined Networks (Sdn)

The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more

Guide to Computer Network Security

Guide to Computer Network Security

This important text/reference presents a comprehensive guide to the field of computing and information security and assu......more

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

  • Ingram,出版日期:2024-04-09

This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more

Generative AI Security: Theories and Practices

Generative AI Security: Theories and Practices

  • Ingram,出版日期:2024-04-06

This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more

Robust Machine Learning: Distributed Methods for Safe AI

Robust Machine Learning: Distributed Methods for Safe AI

Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Information Technology Security: Modern Trends and Challenges

Information Technology Security: Modern Trends and Challenges

  • Ingram,出版日期:2024-04-02

This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more

Randomized Response Techniques: Certain Thought-Provoking Aspects

Randomized Response Techniques: Certain Thought-Provoking Aspects

This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the "internet of Things"

This comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises......more

Advances in Emerging Financial Technology & Digital Money

Advances in Emerging Financial Technology & Digital Money

  • Ingram,出版日期:2024-03-29

Advances in Emerging Financial Technology and Digital Money provide a platform for collective reflection, bringing toget......more

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more

Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain

Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain

Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications w......more

The OSINT Handbook: A practical guide to gathering and analyzing online information

The OSINT Handbook: A practical guide to gathering and analyzing online information

Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more

Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks

Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks

Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehe......more

外文書書籍分類

縮小搜尋範圍

依購買狀態搜尋