Macs For Dummies
Take a bite out of all your Mac has to offer with this bestselling guide
So, you joined the cool kids club and bought a Mac. Kudos! Now, do you dare admit to your sophisticated Mac mates that you still need some help figuring out how it works? No worries, Macs For Dummies is here to help! In full color for the first...
Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,...
Book of Numbers
This book, more than any other I’ve written up to this point in my life, was a labor of love. It allowed me to combine the knowledge and experience of two careers (over a decade in government and law enforcement, and close to another decade in the computer field, encompassing almost 20 years of working with computers as a hobbyist).When...
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...
|Result Page: 7 6 5 4 3 2 1 |