Free Delivery Over $100
34710 books were found.
Read More >>
A gripping true story about one ransomware attack and the hands-on lessons you can learn from it In Locked Up:... Read More >>
In the ever-evolving world of cybersecurity, the need for robust and proactive threat intelligence has never been... Read More >>
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference... Read More >>
This volume constitutes the proceedings of Third International Conference on Artificial Intelligence of Things and... Read More >>
The integration of artificial intelligence (AI) with Internet of Things (IoT), known as AIoT. It is recognized for... Read More >>
This book provides a comprehensive introduction to printed flexible sensors, covering key aspects such as main materials,... Read More >>
Misconfigured identities are the leading cause of cyber incidents. Organizations are investing significant resources... Read More >>
Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran... Read More >>
In an era where technological behemoths wield unprecedented power over the digital landscape, this book is a call... Read More >>
Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting... Read More >>
The book explores AI model types including Large Language Models and multimodal embeddings alongside reinforcement... Read More >>
Project Management can play a key role in arriving at an effective decision in various functional areas of management.... Read More >>
Comprehensive resource exploring deep learning techniques for intrusion detection in various applications such as... Read More >>
The latest version of the gold standard in Ubuntu Linux resources In the freshly updated eleventh edition of Ubuntu... Read More >>
Digital transformation is inevitable. The eras of 'if and when' are over and the urgent question of how to best... Read More >>
This book systematically addresses the security and resilience of networked agent systems, from sensor networks... Read More >>
A complete and up-to-date overview of popular and practical erasure codes in distributed storage In Distributed... Read More >>
In today's hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips... Read More >>