This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
The book explores the intricate nexus between biometric systems and need for preserving data integrity as well as security needed during the data communication. It offers an insightful journey through the multifaceted landscape of biometrics, emphas...Loe edasi...
This book offers cutting-edge Intelligent Tools and Techniques that use AI-based Teaching-Learning approaches to enhance education. It describes methods of self-learning with aid of updated library resources that encourage informal learning. The boo...Loe edasi...
The rising demand for smart technologies necessitates the need of upgrading current systems to effectively cater to these expectations. This book serves as an extensive resource that aims to facilitate the integration of ancient and contemporary tec...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key t...Loe edasi...
(Ilmumisaeg: 01-Jun-2026, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781807050672)
This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis. It includes an introduction to hardware trojans, various attack strategies, as well as trojan detection and its countermeasures....Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing, and governing safer digital ecosystems....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing and governing safer digital ecosystems....Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...