Free Delivery Over $100
33485 books were found.
""The book aims to comprehend the developments and changes in the field of digital publishing in a multidimensional... Read More >>
Read More >>
Adversarial machine learning poses a threat to cybersecurity by exploiting vulnerabilities in AI models through... Read More >>
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications,... Read More >>
This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications... Read More >>
A timely technical guide to securing network-connected medical devices In Preventing Bluetooth and Wireless Attacks... Read More >>
This book, a new and revised edition of “Mechatronic Futures”, sets out to identify and discuss the key issues likely... Read More >>
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial... Read More >>
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied... Read More >>
This book explores the frontier where technology meets business in 'Tech Fusion in Business and Society: Harnessing... Read More >>
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and... Read More >>
Explore the transformative intersection of biotechnology and the Internet of Things (IoT) in modern agriculture.... Read More >>
This book constitutes the proceedings of the First WG 12.13 International Conference on Artificial Intelligence... Read More >>
Two bestselling CISA guides in one serious study set This value-packed packed set for the serious CISA certification... Read More >>
The book presents the proceedings of the 12th International Conference on Frontiers of Intelligent Computing: Theory... Read More >>
Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The... Read More >>
This textbook is designed to teach students and practitioners how to integrate Six Sigma techniques with cybersecurity... Read More >>
Cryptographic definitions are often abstract and complex, making them challenging for beginners to understand and... Read More >>