排序依

共有974

The Joy of Cryptography: An Undergraduate Course in Provable Security

The Joy of Cryptography: An Undergraduate Course in Provable Security

A comprehensive introduction to the fundamentals of provable security for advanced undergraduates. This accessible textb......more

Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response

Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response

A gripping true story about one ransomware attack and the hands-on lessons you can learn from it In Locked Up: Lessons L......more

The Digital Twin Handbook: Challenges, Opportunities and Future Research Directions

The Digital Twin Handbook: Challenges, Opportunities and Future Research Directions

  • Ingram,出版日期:2026-01-06

A digital twin (DT) is a digital representation of a real-world physical product, system, or process. It is indistinguis......more

Large Event Security Planning and Emergency Management

Large Event Security Planning and Emergency Management

This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more

Principles of Software Engineering: Secure Software Development

Principles of Software Engineering: Secure Software Development

This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more

Cyberspace Safety and Security: 15th International Symposium, CSS 2025, Hangzhou, China, July 4-7, 2025, Proceedings

Cyberspace Safety and Security: 15th International Symposium, CSS 2025, Hangzhou, China, July 4-7, 2025, Proceedings

  • Ingram,出版日期:2026-01-05

This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, h......more

Fortressing Pixels: Information Security for Images, Videos, Audio and Beyond

Fortressing Pixels: Information Security for Images, Videos, Audio and Beyond

  • Ingram,出版日期:2025-12-31

Emerging and pivotal technologies such as artificial intelligence and deep learning, cloud computing, internet of things......more

Internet-Mediated Exploitation in the Scottish Online Sex Market: A Case Study in Computational Criminology

Internet-Mediated Exploitation in the Scottish Online Sex Market: A Case Study in Computational Criminology

This book uses a mixed-methods approach to understand the role of technology in facilitating exploitation in the UK’s of......more

Advances in Digital Forensics XXI: 21st Ifip Wg 11.9 International Conference, New Delhi, India, January 6-7, 2025, Revised Selected Papers

Advances in Digital Forensics XXI: 21st Ifip Wg 11.9 International Conference, New Delhi, India, January 6-7, 2025, Revised Selected Papers

  • Ingram,出版日期:2025-12-31

This volume constitutes the refereed proceedings of the 21st IFIP WG 11.9 International Conference on Advances in Digita......more

Quantum Cryptography for the Enterprise

Quantum Cryptography for the Enterprise

This book provides a comprehensive discussion of how quantum cryptography is changing cybersecurity. It starts by emphas......more

Metaverse Platform Implementation: Ai, Security, and Applications

Metaverse Platform Implementation: Ai, Security, and Applications

  • Ingram,出版日期:2025-12-30

This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D d......more

Crypto Engine Design

Crypto Engine Design

A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book ex......more

Crypto Engine Design

Crypto Engine Design

A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book ex......more

Quantum Computing: The Past, the Present, and the Future

Quantum Computing: The Past, the Present, and the Future

  • Ingram,出版日期:2025-12-28

The aim of this book is to provide a comprehensive exploration of the recent developments in the field of quantum comput......more

Blockchain Technology for Water and Environmental Systems

Blockchain Technology for Water and Environmental Systems

  • Ingram,出版日期:2025-12-28

Blockchain technology, with its transparency, security, and immutability, offers promising applications in environmental......more

Proceedings of International Conference on Information Technology and Artificial Intelligence: Itai 2025, Volume 3

Proceedings of International Conference on Information Technology and Artificial Intelligence: Itai 2025, Volume 3

  • Ingram,出版日期:2025-12-27

This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on In......more

Intelligent Security Solutions for Cyber-Physical Systems

Intelligent Security Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2025-12-26

This book provides a comprehensive overview of cyber-physical systems and the security concepts like attack detection me......more

Blockchain-based Internet of Things: Opportunities, Challenges and Solutions

Blockchain-based Internet of Things: Opportunities, Challenges and Solutions

  • Ingram,出版日期:2025-12-26

This reference text presents an overview of the blockchain-based internet of things systems, along with the opportunitie......more

Transforming Cybersecurity with Machine Learning

Transforming Cybersecurity with Machine Learning

This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, ......more

Secure and Smart Cyber-Physical Systems

Secure and Smart Cyber-Physical Systems

  • Ingram,出版日期:2025-12-25

Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the inter......more

Social Engineering in Cybersecurity: Threats and Defenses

Social Engineering in Cybersecurity: Threats and Defenses

  • Ingram,出版日期:2025-12-25

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical ......more

Blockchain and Machine Learning for IoT Security

Blockchain and Machine Learning for IoT Security

  • Ingram,出版日期:2025-12-25

This book discusses various recent techniques and solutions related to IoT deployment, especially security, and privacy.......more

Transforming Cybersecurity with Machine Learning

Transforming Cybersecurity with Machine Learning

This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, ......more

Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation

Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation

  • Ingram,出版日期:2025-12-25

The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value ......more

Operation Carder Kaos: How One Agent Penetrated the Underground Community

Operation Carder Kaos: How One Agent Penetrated the Underground Community

He didn’t just chase cybercriminals--he became one of them. In this electrifying blend of true crime, cyber espionage, a......more

Operation Carder Kaos: How One Agent Penetrated the Underground Community

Operation Carder Kaos: How One Agent Penetrated the Underground Community

He didn’t just chase cybercriminals--he became one of them. In this electrifying blend of true crime, cyber espionage, a......more

Exploring Complex Networks with Quantum Walks

Exploring Complex Networks with Quantum Walks

This book explores the intersection of quantum computing and network science. It bridges the theoretical foundations of ......more

Nonlocal Quantum Computing Theory

Nonlocal Quantum Computing Theory

Nonlocal Quantum Computing Theory offers a fresh perspective on quantum computing, moving beyond the traditional qubit-b......more

Accelerated Quantum Technologies Change Management

Accelerated Quantum Technologies Change Management

Accelerated Quantum Technologies Change Management offers business and technology leaders a guide to navigating and acce......more

Port Management Strategy for Enhancing Cybersecurity and Resilience: Learning from Case Studies

Port Management Strategy for Enhancing Cybersecurity and Resilience: Learning from Case Studies

This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and man......more

The Business of Quantum Technologies: From Theory to Innovation Strategy

The Business of Quantum Technologies: From Theory to Innovation Strategy

Quantum technologies (QT) are rapidly advancing from scientific propositions to commercial realities. QT leverage quantu......more

The Definitive Guide to Responsible AI

The Definitive Guide to Responsible AI

As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive......more

Quantum Algorithms and Their Applications in Cryptology

Quantum Algorithms and Their Applications in Cryptology

Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. A......more

Quantum Shield for AI Security: Secure Systems, Quantum Blockchain, Adversarial Attacks and Defenses in AI

Quantum Shield for AI Security: Secure Systems, Quantum Blockchain, Adversarial Attacks and Defenses in AI

  • Ingram,出版日期:2025-12-15

The book explores how quantum computing can protect AI systems from sophisticated adversarial threats. As AI application......more

The Definitive Guide to Responsible AI

The Definitive Guide to Responsible AI

As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive......more

Quantum Algorithms and Their Applications in Cryptology

Quantum Algorithms and Their Applications in Cryptology

Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. A......more

Information Systems Security: 21st International Conference, Iciss 2025, Indore, India, December 16-20, 2025, Proceedings

Information Systems Security: 21st International Conference, Iciss 2025, Indore, India, December 16-20, 2025, Proceedings

  • Ingram,出版日期:2025-12-14

This book constitutes the refereed proceedings of the 21st International Conference on Information Systems Security, ICI......more

Distributed Storage Coding Theory and Applications

Distributed Storage Coding Theory and Applications

A complete and up-to-date overview of popular and practical erasure codes in distributed storage In Distributed Storage ......more

AI-Native LLM Security: Threats, defenses, and best practices for building safe and trustworthy AI

AI-Native LLM Security: Threats, defenses, and best practices for building safe and trustworthy AI

Unlock the secrets to safeguarding AI by exploring the top risks, essential frameworks, and cutting-edge strategies-feat......more

Cybersecurity: A Practical Introduction

Cybersecurity: A Practical Introduction

In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you......more

Cybersecurity: A Practical Introduction

Cybersecurity: A Practical Introduction

In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you......more

Nanoelectronics, Nanophotonics, and Quantum Technologies: Devices and Applications

Nanoelectronics, Nanophotonics, and Quantum Technologies: Devices and Applications

  • Ingram,出版日期:2025-12-07

This timely compendium provides state-of-the-art articles covering research areas in Nanoelectronics, Nanophotonics and ......more

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part IV

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part IV

  • Ingram,出版日期:2025-12-05

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more

Federated Learning: Security and Privacy

Federated Learning: Security and Privacy

As data becomes more abundant and widespread across personal devices, the need for secure, privacy-aware machine learnin......more

Strategic Security Management: A Risk Assessment Guide for Decision Makers

Strategic Security Management: A Risk Assessment Guide for Decision Makers

Strategic Security Management, Third Edition is a vital roadmap for modern security professionals, delivering a comprehe......more

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part III

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part III

  • Ingram,出版日期:2025-12-03

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part I

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part I

  • Ingram,出版日期:2025-12-02

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part II

Theory of Cryptography: 23rd International Conference, Tcc 2025, Aarhus, Denmark, December 1-5, 2025, Proceedings, Part II

  • Ingram,出版日期:2025-12-02

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more

Security and Privacy: 4th International Conference, Icsp 2025, Rourkela, India, December 5-7, 2025, Proceedings

Security and Privacy: 4th International Conference, Icsp 2025, Rourkela, India, December 5-7, 2025, Proceedings

  • Ingram,出版日期:2025-12-02

This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025,......more

Cloud Security: Managing Emerging Threats

Cloud Security: Managing Emerging Threats

The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates al......more

Real Life Cryptology: Ciphers and Secrets in Early Modern Hungary

Real Life Cryptology: Ciphers and Secrets in Early Modern Hungary

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territor......more

Cybersecurity Leadership

Cybersecurity Leadership

Cybersecurity Leadership: Ancient Wisdom for the Digital Battlefield In an era where cyberattacks can bring global corpo......more

Introduction to Biometrics

Introduction to Biometrics

This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioner......more

Cyber Empires: How Nations Are Fighting for Digital Supremacy

Cyber Empires: How Nations Are Fighting for Digital Supremacy

When power no longer needs boots to cross a border, it arrives through updates, outages, and the quiet recalibration of ......more

The Invisible Wars: How Nations Fight Without Firing Bullets

The Invisible Wars: How Nations Fight Without Firing Bullets

Power today is exercised in quiet rooms and cached files, not on battlefields. If you want to understand why a headline ......more

The Invisible Wars: How Nations Fight Without Firing Bullets

The Invisible Wars: How Nations Fight Without Firing Bullets

Power today is exercised in quiet rooms and cached files, not on battlefields. If you want to understand why a headline ......more

Cyber Empires: How Nations Are Fighting for Digital Supremacy

Cyber Empires: How Nations Are Fighting for Digital Supremacy

When power no longer needs boots to cross a border, it arrives through updates, outages, and the quiet recalibration of ......more

Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approa......more

Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approa......more

Kali Linux Cookbook - Third Edition: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark

Kali Linux Cookbook - Third Edition: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark

Discover step-by-step solutions for tackling real-world cybersecurity tasks using essential Kali Linux tools and techniq......more

Mastering Endpoint Management using Microsoft Intune Suite: Learn Everything About Intune Suite

Mastering Endpoint Management using Microsoft Intune Suite: Learn Everything About Intune Suite

Unlock the full potential of Microsoft Intune Suite with hands-on deployment, policy control, architecture insights, and......more

Security Paradigms in 6g Smart Cities and Iot Ecosystems: Navigating the Future

Security Paradigms in 6g Smart Cities and Iot Ecosystems: Navigating the Future

  • Ingram,出版日期:2025-11-27

As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art te......more

Quantal and Classical Coherence and Correlation

Quantal and Classical Coherence and Correlation

This book highlights the physical processes of quantum mechanics, such as quantum interference, entanglement, and quantu......more

Generative AI for Cybersecurity and Privacy

Generative AI for Cybersecurity and Privacy

  • Ingram,出版日期:2025-11-25

Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligenc......more

15 Methods to Generate $7,500 to $11,000 in 6 to 12 Months Using AI Tools While Working Remotely

15 Methods to Generate $7,500 to $11,000 in 6 to 12 Months Using AI Tools While Working Remotely

15 Methods to Generate $7,500 to $11,000 in 6 to 12 Months Using AI Tools While Working Remotely FOR JUST $30.00 DON’T M......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain and Cryptocurrency for Entrepreneurs

Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more

Securing Android Apps: A Practical Approach for Secure Development

Securing Android Apps: A Practical Approach for Secure Development

In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is n......more

Securing Android Apps: A Practical Approach for Secure Development

Securing Android Apps: A Practical Approach for Secure Development

In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is n......more

101 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類

縮小搜尋範圍

依購買狀態搜尋