排序依

共有10389

Advancements in Cyber Crime Investigations and Modern Data Analytics

Advancements in Cyber Crime Investigations and Modern Data Analytics

  • Ingram,出版日期:2024-12-27

This book presents a fresh perspective on combating cybercrime, showcasing innovative solutions from experts across vari......more

Surviving the Wild Wild Web: A User’s Playbook to Navigating the Internet’s Trickiest Terrains

Surviving the Wild Wild Web: A User’s Playbook to Navigating the Internet’s Trickiest Terrains

The information security arena is often vague and confusing for internet users and fallling into cyber traps can take et......more

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more

The Use of Information and Communication Technologies (Ict) in the Management of the Innovative and Smart City

The Use of Information and Communication Technologies (Ict) in the Management of the Innovative and Smart City

  • Ingram,出版日期:2024-12-24

Key elements in the formation of smart cities are development based on cooperation between local governments and busines......more

E-Health Security Management: Communications Security, Data Processing Security and Patient Privacy

E-Health Security Management: Communications Security, Data Processing Security and Patient Privacy

Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable ......more

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber Ciso Marksmanship: Hitting the Mark in Cybersecurity Leadership

Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more

Ransomware Evolution

Ransomware Evolution

  • Ingram,出版日期:2024-12-22

Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they......more

Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response

Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response

Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against ev......more

Comptia Network+ N10-009 Cert Guide

Comptia Network+ N10-009 Cert Guide

Learn, prepare, and practice for CompTIA Network+ N10-009 exam success with this Cert Guide from Pearson IT Certificatio......more

Big Data and Blockchain Technology for Secure Iot Applications

Big Data and Blockchain Technology for Secure Iot Applications

  • Ingram,出版日期:2024-12-19

Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more

Principles and Applications of Vector Network Analyzer Calibration Techniques

Principles and Applications of Vector Network Analyzer Calibration Techniques

This book summarizes the work developed over more than two decades in the field of advanced calibration techniques for v......more

Ai, Machine Learning and Deep Learning: A Security Perspective

Ai, Machine Learning and Deep Learning: A Security Perspective

  • Ingram,出版日期:2024-12-19

Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provid......more

Internet of Things: Applications for Sustainable Development

Internet of Things: Applications for Sustainable Development

  • Ingram,出版日期:2024-12-19

This book will throw light on recent developments in latest field and will be of great interest to know various applicat......more

Data-Driven Intelligence in Wireless Networks: Concepts, Solutions, and Applications

Data-Driven Intelligence in Wireless Networks: Concepts, Solutions, and Applications

  • Ingram,出版日期:2024-12-19

This book highlights the importance of data-driven techniques to solve wireless communication problems. It presents a nu......more

Applications of 5g and Beyond in Smart Cities

Applications of 5g and Beyond in Smart Cities

  • Ingram,出版日期:2024-12-19

This book explores the potential of 5G and beyond technologies in smart city setup, including introduction to 5G along w......more

Securing the Nation’s Critical Infrastructures: A Guide for the 2021-2025 Administration

Securing the Nation’s Critical Infrastructures: A Guide for the 2021-2025 Administration

  • Ingram,出版日期:2024-12-19

This book is intended to help the incoming administration and members of critical infrastructure communities to prioriti......more

Deep Learning and Its Applications for Vehicle Networks

Deep Learning and Its Applications for Vehicle Networks

  • Ingram,出版日期:2024-12-19

This book is based on the work from world-famous experts on the application of DL for vehicle networks. It consists of t......more

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography

  • Ingram,出版日期:2024-12-19

The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography a......more

Internet of Things and Cyber Physical Systems: Security and Forensics

Internet of Things and Cyber Physical Systems: Security and Forensics

  • Ingram,出版日期:2024-12-19

This book discusses the advancements in IoT and Cyber-Physical Systems Forensics. This book not only presents numerous c......more

Security Implementation in Internet of Medical Things

Security Implementation in Internet of Medical Things

  • Ingram,出版日期:2024-12-19

This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers toge......more

Computational Intelligence for Cybersecurity Management and Applications

Computational Intelligence for Cybersecurity Management and Applications

  • Ingram,出版日期:2024-12-19

The book offers comprehensive coverage of the essential topics, including machine Learning and Deep Learning for cyberse......more

Artificial Intelligence of Health-Enabled Spaces

Artificial Intelligence of Health-Enabled Spaces

  • Ingram,出版日期:2024-12-19

This book is dedicated to addressing the major challenges in fighting diseases and psychological issues using AI. Challe......more

Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis

Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis

This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides method......more

Enterprise Architecture with Sap: Planning, Management, and Transformation

Enterprise Architecture with Sap: Planning, Management, and Transformation

"Calling all SAP enterprise architects-the strategy guide you need is here! See how the SAP EA Framework and SAP LeanIX ......more

Fake News on the Internet

Fake News on the Internet

  • Ingram,出版日期:2024-12-18

This book provides a review of current research in fake news and presents six new empirical research studies examining i......more

Security and Privacy for 6g Massive Iot

Security and Privacy for 6g Massive Iot

  • Ingram,出版日期:2024-12-16

Anticipate the security and privacy threats of the future with this groundbreaking text The development of the next gene......more

Dynamical Behaviors of Multiweighted Complex Network Systems

Dynamical Behaviors of Multiweighted Complex Network Systems

"Recently, numerous researchers have turned their attention to the dynamical behaviors of complex dynamical networks (CD......more

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Internal Auditing

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Internal Auditing

In The Closing of the Auditor’s Mind?, author David J. O’Regan describes internal auditing as an important "binding agen......more

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Virtue, Trust, and Wisdom in Modern Auditing

The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Virtue, Trust, and Wisdom in Modern Auditing

In The Closing of the Auditor’s Mind? David J. O’Regan describes internal auditing as an important "binding agent" of so......more

Protecting Location Privacy in the Era of Big Data: A Technical Perspective

Protecting Location Privacy in the Era of Big Data: A Technical Perspective

This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focu......more

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies

  • Ingram,出版日期:2024-12-10

Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies p......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXIX

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXIX

  • Ingram,出版日期:2024-12-07

The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more

Segment Routing for Service Providers and Enterprise Networks

Segment Routing for Service Providers and Enterprise Networks

Unlock the Future of Networking with Segment Routing: Your Comprehensive Guide to SR-MPLS and SRv6 for Service Provider ......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XIV

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XIV

  • Ingram,出版日期:2024-12-05

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Hack to the Future: The Us Government’s Relentless Pursuit of Hackers

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more

Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV

Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV

  • Ingram,出版日期:2024-12-03

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXX

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXX

  • Ingram,出版日期:2024-12-02

The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XXXVII

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XXXVII

  • Ingram,出版日期:2024-12-02

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Product-Focused Software Process Improvement: 25th International Conference, Profes 2024, Tartu, Estonia, December 2-4, 2024, Proceedings

Product-Focused Software Process Improvement: 25th International Conference, Profes 2024, Tartu, Estonia, December 2-4, 2024, Proceedings

  • Ingram,出版日期:2024-12-02

This book constitutes the refereed proceedings of the 25th International Conference on Product-Focused Software Process ......more

Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I

Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I

  • Ingram,出版日期:2024-12-02

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LIII

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LIII

  • Ingram,出版日期:2024-12-01

The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more

Cybersecurity: Safeguarding Our Digital World

Cybersecurity: Safeguarding Our Digital World

Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals t......more

Data-Rate-Constrained State Estimation and Control of Complex Networked Systems

Data-Rate-Constrained State Estimation and Control of Complex Networked Systems

This book presents research developments and novel methodologies on data-rate-constrained control and state estimation f......more

Cybersecurity: Technology and Governance

Cybersecurity: Technology and Governance

This book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LII

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LII

  • Ingram,出版日期:2024-11-29

The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXVI

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXVI

  • Ingram,出版日期:2024-11-29

The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more

Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II

Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II

  • Ingram,出版日期:2024-11-29

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory......more

Federated Learning for Internet of Medical Things: Concepts, Paradigms, and Solutions

Federated Learning for Internet of Medical Things: Concepts, Paradigms, and Solutions

  • Ingram,出版日期:2024-11-29

This book intends to present emerging Federated Learning (FL)-based architectures, frameworks, and models in Internet of......more

Systems 4.0: Systems Foundations for Industry 4.0

Systems 4.0: Systems Foundations for Industry 4.0

The underlying premise for Industry 4.0 is a systems approach. This book introduces the concept of Systems 4.0 as a foun......more

Research Advances in Intelligent Computing

Research Advances in Intelligent Computing

  • Ingram,出版日期:2024-11-29

Since the invention of computers and other similar machines, scientists and researchers have been trying very hard to en......more

Emerging Technologies and the Indian It Sector

Emerging Technologies and the Indian It Sector

This book examines the implementation of emerging technology projects in the service-based Indian IT sector. The title s......more

The Zero Trust Framework: Threat Hunting & Quantum Mechanics

The Zero Trust Framework: Threat Hunting & Quantum Mechanics

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very com......more

Green Internet of Things

Green Internet of Things

Green Internet of Things (IoT) envisions the concept of reducing the energy consumption of IoT devices and making the en......more

It Governance and Information Security: Guides, Standards, and Frameworks

It Governance and Information Security: Guides, Standards, and Frameworks

IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by informati......more

AI for Big Data-Based Engineering Applications from Security Perspectives

AI for Big Data-Based Engineering Applications from Security Perspectives

  • Ingram,出版日期:2024-11-29

Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input ......more

Digital Twin: A Dynamic System and Computing Perspective

Digital Twin: A Dynamic System and Computing Perspective

The digital twin of a physical system is an adaptive computer analog which exists in the cloud and adapts to changes in ......more

Future Connected Technologies: Growing Convergence and Security Implications

Future Connected Technologies: Growing Convergence and Security Implications

  • Ingram,出版日期:2024-11-29

The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart dom......more

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Information security primarily serves these six distinct purposes--authentication, authorization, prevention of data the......more

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Manuscrypt: Designed for Mankind - Anthropocentric Information Security

Information security primarily serves these six distinct purposes--authentication, authorization, prevention of data the......more

AI Product Manager’s Handbook - Second Edition: Build, integrate, scale, and optimize products to grow as an AI product manager

AI Product Manager’s Handbook - Second Edition: Build, integrate, scale, and optimize products to grow as an AI product manager

Whether you’re a seasoned professional or a newcomer to the world of AI product management, this is your definitive guid......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XII

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XII

  • Ingram,出版日期:2024-11-28

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XX

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XX

  • Ingram,出版日期:2024-11-27

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LV

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LV

  • Ingram,出版日期:2024-11-27

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXXXV

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part LXXXV

  • Ingram,出版日期:2024-11-27

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XLVIII

Computer Vision - Eccv 2024: 18th European Conference, Milan, Italy, September 29-October 4, 2024, Proceedings, Part XLVIII

  • Ingram,出版日期:2024-11-27

The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more

Hybrid Communication Systems for Future 6g and Beyond: Visible Light Communication and Radio Over Fiber Technology

Hybrid Communication Systems for Future 6g and Beyond: Visible Light Communication and Radio Over Fiber Technology

"With the exponential growth in indoor wireless communication, the necessity for novel technologies to manage the escala......more

CCNA Certification Practice Tests: Exam Tbd

CCNA Certification Practice Tests: Exam Tbd

The best practice and preparation for the UPDATED CCNA certification exam CCNA Certification Practice Tests, Second Edit......more

CCNA Certification Study Guide: Exam Tbd

CCNA Certification Study Guide: Exam Tbd

Your comprehensive guide to succeeding on the UPDATED CCNA Certification exam In the newly revised second edition of the......more

Networking Protocols Unleashed: Exploring the Depths of TCP/IP, DNS, and More

Networking Protocols Unleashed: Exploring the Depths of TCP/IP, DNS, and More

Are you ready to master the art of networking? Have you ever wondered what sets expert hackers apart in understanding pr......more

1041 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類