Learning MySQL: Get a Handle on Your Data
Vinicius M. Grippa & Sergey Kuzmichev
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Dolev Farhi & Nick Aleks
Cybersecurity for Smart Cities: Practices and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Responsible AI in Practice: A Practical Guide to Safe and Human ...
Toju Duke & Paolo Giudici
Generative AI for Cybersecurity: Fundamentals, Applications, ...
Diep N. Nguyen & Ly Vu & Quang Uy Nguyen & Dinh Thai Hoang
Continuous Auditing with AI in the Public Sector: Security, ...
Lourens J. Erasmus & Sezer Bozkuş Kahyaoğlu
Safeguarding the Future: Security and Privacy by Design for ...
Alan Tang
Current and Future Trends on AI Applications: Studies in Computational ...
Mohammed A. Al-Sharafi & Mostafa Al-Emran & Moamin A. Mahmoud & Ibrahim Arpaci & Janusz Kacprzyk & Marco Dorigo & Andries Engelbrecht & Vladik Kreinovich & Francesco Carlo Morabito & Roman Slowinski & Yingxu Wang & Yaochu Jin
IoT and Analytics in Renewable Energy Systems - Volume II: AI, ...
O. V. Gnana Swathika, K. Karthikeyan; Sanjeevikumar Padmanaban
Artificial Intelligence for Cybersecurity: Develop AI Approaches ...
Bojan Kolosnjaji & Huang Xiao & Peng Xu & Apostolis Zarras
IoT and Analytics in Renewable Energy Systems - Volume I: Sustainable ...
Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...
Francisco Javier Santiago Vázquez
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
Rafay Baloch
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...
Matt Hand
Ethical Hacking Workshop: Explore a Practical Approach to Learning ...
Rishalin Pillay & Mohammed Abutheraa
The Art of Social Engineering: Uncover the secrets behind the ...
Bravo, Cesar & Toska, Desilda & Childress, Rhonda
Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...
Jon DiMaggio