|
|
1293件中 331件 - 360件
7 8 9 10 11 12 13 14 15 16 17
| 商品 | 説明 | 価格 |

【中古】【非常に良い】サイボーグ009 【コミックセット】
スカイマーケットプラス
|
【中古】【非常に良い】サイボーグ009 【コミックセット】【メーカー名】【メーカー型番】【ブランド名】【商品説明】サイボーグ009 【コミックセット】当店では初期不良に限り、商品到着から7日間は返品を 受付けております。他モールとの併売品の為、完売の際はご連絡致しますのでご了承ください。中古品の商品タイトルに「限定」「初回」「保証」などの表記がありましても、特典・付属品・保証等は付いておりません。掲載と付属品が異なる場合は確認のご連絡をさせていただきます。ご注文からお届けまで1、ご注文⇒ご注文は24時間受け付けております。2、注文確認⇒ご注文後、当店から注文確認メールを送信します。3、お届けまで3〜10営業日程度とお考えください。4、入金確認⇒前払い決済をご選択の場合、ご入金確認後、配送手配を致します。5、出荷⇒配送準備が整い次第、出荷致します。配送業者、追跡番号等の詳細をメール送信致します。6、到着⇒出荷後、1〜3日後に商品が到着します。 ※離島、北海道、九州、沖縄は遅れる場合がございます。予めご了承下さい。お電話でのお問合せは少人数で運営の為受け付けておりませんので、メールにてお問合せお願い致します。営業時間 月〜金 11:00〜17:00お客様都合によるご注文後のキャンセル・返品はお受けしておりませんのでご了承ください。ご来店ありがとうございます。
|
29,640円
|

Synthesis of Medium-Sized Cycloalkenes Via Fused-Cyclobutenes SYNTHESIS OF MED-SIZED CYCLOAL (Springer Theses) [ Tomohiro Ito ]
楽天ブックス
|
SYNTHESIS OF MEDーSIZED CYCLOAL Springer Theses Tomohiro Ito SPRINGER NATURE2024 Hardcover 2024 English ISBN:9789819707867 洋書 Computers & Science(コンピューター&科学) Science
|
75,020円
|

【中古】【非常に良い】デュエルマスターズ新4弾/DMRP-04裁/MD1/秘3/SS/煌龍 サッヴァーク
ドリエムコーポレーション
|
【メーカー名】【メーカー型番】【ブランド名】デュエルマスターズ【商品説明】デュエルマスターズ新4弾/DMRP-04裁/MD1/秘3/SS/煌龍 サッヴァーク・画像はイメージ写真ですので付属品など画像の通りではないこともございます。 付属品については商品タイトルに記載がない場合がありますので、 ご不明な場合はメッセージにてお問い合わせください。・当店ではレコード盤には商品タイトルに[レコード]と表記しております。 表記がない物はすべてCDですのでご注意ください。・当店では初期不良に限り、商品到着から7日間は返品を 受付けております。 お問い合わせ・メールにて不具合詳細をご連絡ください。・他モールとの併売品の為、完売の際はキャンセルご連絡させて頂きます。・中古品の商品タイトルに「限定」「初回」「保証」「DLコード」などの表記がありましても、 特典・付属品・帯・保証等は付いておりません。・電子辞書、コンパクトオーディオプレーヤー等のイヤホンは写真にありましても 衛生上、基本お付けしておりません。※未使用品は除く・品名に【import】【輸入】【北米】【海外】等の国内商品でないと把握できる表記商品について 国内のDVDプレイヤー、ゲーム機で稼働しない場合がございます。予めご了承の上、購入ください。・掲載と付属品が異なる場合は確認のご連絡をさせて頂きます。ご注文からお届けまで1、ご注文⇒ご注文は24時間受け付けております。2、注文確認⇒ご注文後、当店から注文確認メールを送信します。3、お届けまで3〜10営業日程度とお考えください。4、入金確認⇒前払い決済をご選択の場合、ご入金確認後、配送手配を致します。5、出荷⇒配送準備が整い次第、出荷致します。配送業者、追跡番号等の詳細をメール送信致します。6、到着⇒出荷後、1〜3日後に商品が到着します。 ※離島、北海道、九州、沖縄は遅れる場合がございます。予めご了承下さい。・お電話でのお問合せは少人数で運営の為受け付けておりませんので、お問い合わせ・メールにてお願い致します。★お客様都合によるご注文後のキャンセル・返品は お受けしておりませんのでご了承ください。
|
7,480円
|

Digital Forensics and Cyber Crime 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.</p> <p>The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:</p> <p>Volume I:</p> <p>Crime profile analysis and Fact checking, Information hiding and Machine learning.</p> <p>Volume II:</p> <p>Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
9,723円
|

Digital Forensics and Cyber Crime 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.</p> <p>The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:</p> <p>Volume I:</p> <p>Crime profile analysis and Fact checking, Information hiding and Machine learning.</p> <p>Volume II:</p> <p>Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
9,723円
|

Humans, Angels, And Cyborgs Aboard Theseus' Ship Metaphysics, Mythology, and Mysticism in Trans-/Posthumanist Philosophies【電子書籍】[ Mattia Geretto ]
楽天Kobo電子書籍ストア
|
<p>This book addresses the most suggestive themes of transhumanism and critical posthumanism by placing them in dialogue with classic problems of metaphysics, and with some great thinkers of the past (Bruno, Spinoza, and above all Leibniz). The main purpose of this comparison is to invite transhumanists and critical posthumanists to consider a highly complex problematic tradition rooted in the history of philosophy. This study also makes use of examples drawn from the history of mythology, angelology, and mysticism. At the same time, the book promotes dialogue between scholars of classical metaphysics and philosophy of religion, and the potential metaphysical/spiritual theories developed independently by transhumanist and posthumanist thinkers within an anti-dualist and naturalistic philosophical framework.</p> <p>The goal is to ‘enhance’ contemporary transhumanism and posthumanism by promoting the need to safeguard intelligence as a principle, without falling into the trap of a violent and egotistic metaphysics.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
5,469円
|

Get Your Skin Back Professional Strategies for Treating Acne Vulgaris and Cystic Acne【電子書籍】[ IDONGESIT OKPOMBOR MD ]
楽天Kobo電子書籍ストア
|
<p>"<strong>Unleash the Power of Clear Skin: The Ultimate Guide to Treating Acne Vulgaris and Cystic Acne.</strong>"</p> <p>Transform your skin with '<em>Get Your Skin Back: Professional Strategies for Treating Acne Vulgaris and Cystic Acne</em>.'</p> <p>In this revolutionary book, you will discover the secrets to achieving flawless skin and a clear complexion.</p> <p>? Learn the <em><strong>hidden causes of acne</strong></em> and dispel common myths that could be holding you back emotionally.</p> <p>? Discover the <em><strong>different types of acne</strong></em> and conditions that are often confused with it, and how to properly identify and treat them.</p> <p>? Get access to <em><strong>crucial lab tests</strong></em> and the <em><strong>latest treatment methods</strong></em>, backed by evidence-based insights and expert advice.</p> <p>? Experience a transformation in your skin's health and appearance as you implement the strategies and techniques outlined in this book.</p> <p>In '<strong>Get Your Skin Back</strong>,' you will find:</p> <p>? A comprehensive understanding of <em><strong>the underlying factors that contribute to acne</strong></em> and how to address them.</p> <p>? Proven <em><strong>methods for treating both acne vulgaris and cystic acne</strong></em> to achieve long-lasting results.</p> <p>? Practical tips for <em><strong>maintaining clear and healthy skin</strong></em> in the long term.</p> <p>? Expert guidance on how to personalize your skincare routine for optimal results.</p> <p>- And much more!</p> <p><strong>Don't miss out on the opportunity to get your hands on this life-changing book!</strong></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
164円
|

【中古】星を見あげたふたりの夏 / LordCynthia
ネットオフ 送料がお得店
|
星を見あげたふたりの夏 単行本 の詳細 出版社: あかね書房 レーベル: 作者: LordCynthia カナ: ホシオミアゲタフタリノナツ / シンシアロード サイズ: 単行本 ISBN: 4251065735 発売日: 2018/08/01 関連商品リンク : LordCynthia あかね書房
|
255円
|

Ultimate Linux Network Security for Enterprises Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services (English Edition)【電子書籍】[ Adarsh Kant ]
楽天Kobo電子書籍ストア
|
<p><strong>"Level Up Your Security Skills with Linux Expertise!"</strong></p> <p><strong>Key Features</strong><br /> ● Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats.<br /> ● Hands-on exercises to reinforce your understanding and gain practical experience in implementing cybersecurity strategies.<br /> ● Gain valuable insights from industry best practices to effectively address emerging threats and protect your organization's digital assets within the evolving landscape of Linux network security.</p> <p><strong>Book Description</strong><br /> The <em><strong>Ultimate Linux Network Security for Enterprises</strong></em> is your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems.</p> <p>The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization’s networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role.</p> <p>From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization’s digital assets.</p> <p><strong>What you will learn</strong><br /> ● Perform thorough vulnerability assessments on Linux networks to pinpoint network weaknesses.<br /> ● Develop and deploy resilient security incident response plans.<br /> ● Configure and oversee sophisticated firewall and packet filtering rules.<br /> ● Employ cryptography techniques to ensure secure data transmission and storage.<br /> ● Implement efficient Intrusion Detection and Prevention Systems (IDS/IPS).<br /> ● Enforce industry-leading best practices to bolster Linux network security defenses.</p> <p><strong>Table of Contents</strong></p> <ol> <li>Exploring Linux Network Security Fundamentals</li> <li>Creating a Secure Lab Environment</li> <li>Access Control Mechanism in Linux</li> <li>Implementing Firewalls And Packet Filtering</li> <li>Mastering Cryptography for Network Security</li> <li>Intrusion Detection System and Intrusion Prevention System</li> <li>Conducting Vulnerability Assessment with Linux</li> <li>Creating Effective Disaster Recovery Strategies</li> <li>Robust Security Incident Response Plan</li> <li>Best Practices for Linux Network Security Professionals<br /> <strong>Index</strong></li> </ol>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
3,693円
|

Neon High Remastered Cyberpunk Fighters Saga【電子書籍】[ Carter Holland ]
楽天Kobo電子書籍ストア
|
<p><strong>Cyberpunk love conquers all.</strong></p> <p><strong>The Fight for the future begins here...</strong></p> <p><strong>Cyberpunkers January and Sage 999 battle other high school fighters in a Sector called Gideon on Lockdown...</strong></p> <p><strong>Cyberball is their sport and January will take on a student that will unlock past...</strong></p> <p><strong>She and Sage 999 will battle a Mech that attacks the school along with other students and finally get out into the world...</strong></p> <p><strong>The enemy is watching them.</strong></p> <p><strong>If you are fans of 2D fighters and Cyberpunk Manga.</strong></p> <p><strong>You will enjoy this rabbit hole of a story for ages to come.</strong></p> <p><strong>Buy it now!</strong></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
829円
|

Biotechnological Processes for Green Energy, and High Value Bioproducts by Microalgae, and Cyanobacteria Cultures【電子書籍】
楽天Kobo電子書籍ストア
|
<p>Microalgae and cyanobacteria are a very diverse group of photosynthetic microorganisms with many applications. Some of them are related to the accumulation of molecules involved in specific metabolic pathways such as pigments, fatty acids, polyunsaturated fatty acids, carbohydrates, amino acids, etc. Also, there are uses of the biomass related to the exploitation of physiological necessities such as the absorption of essential nutrients (the removal of nitrogen and phosphorus from wastewater, the capture of CO2 from the fixation of nitrogen, etc.). Nevertheless, the evaluation in financial and life-cycle aspects is necessary to ensure the industrial application of the processes. The objective of the book is to analyze innovative applications of microalgae and cyanobacteria to develop environmental-friendly processes for removal of pollutants, wastewater treatment, production of high-value products or bioenergy, and finally evaluate the feasibility of the processes both ineconomic and sustainability aspects.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
19,447円
|

【中古】洋書 The Mongoliad Book One (The Mongoliad Cycle) 47north Neal Stephenson,
リサイクルストアあかつき
|
【中古】洋書 The Mongoliad Book One (The Mongoliad Cycle) 47north Neal Stephenson, SKU05W-240410013014001-000 jan9781612182360 コンディション中古 - 可 コンディション説明表紙にスレ、ヨレ、ヤケ、多少の傷み、天地小口にヤケ、シミ、白ページや見返しに角の折り込み、折れ目、があります。本を読むことに支障はございません。※注意事項※■商品・状態はコンディションガイドラインに基づき、判断・出品されております。■付録等の付属品がある商品の場合、記載されていない物は『付属なし』とご理解下さい。※ ポイント消化 にご利用ください。 送料宅配便コンパクト 商品説明【当店の商品詳細・付属品や状態はコンディション説明でご確認ください。こちらに記載がある場合は書籍本体・内容の説明や元の付属品の説明であり、当店の商品とは異なる場合があります。参考としてご覧ください。】The first novel to be released in The Foreworld Saga, The Mongoliad: Book One, is an epic-within-an-epic, taking place in 13th century. In it, a small band of warriors and mystics raise their swords to save Europe from a bloodthirsty Mongol invasion. Inspired by their leader (an elder of an order of warrior monks), they embark on a perilous journey and uncover the history of hidden knowledge and conflict among powerful secret societies that had been shaping world events for millennia.But the sa・・・ ※※※※注意事項※※※※・配送方法は当店指定のものとなります。変更希望の場合は別途追加送料を頂戴します。・送料無料の商品については、当社指定方法のみ無料となります。・商品画像へ、表紙についているステッカーや帯等が映っている場合がありますが、中古品の為付属しない場合がございます。・写真内にある本・DVD・CDなど商品以外のメジャーやライター等のサイズ比較に使用した物、カゴやブックエンド等撮影時に使用した物は付属致しません。コンディション対応表新品未開封又は未使用ほぼ新品新品だがやや汚れがある非常に良い使用されているが非常にきれい良い使用感があるが通読に問題がない可使用感や劣化がある場合がある書き込みがある場合がある付属品欠品している場合がある難あり強い使用感や劣化がある場合がある強い書き込みがある場合がある付属品欠品している場合がある
|
1,508円
|

Tokyo Outdoors 45 Walks, Hikes and Cycling Routes to Explore the City Like a Local【電子書籍】[ Matthew Baxter ]
楽天Kobo電子書籍ストア
|
<p><strong>Tokyo Outdoors</strong> is the only guide you’ll need to fully explore Tokyo and the surrounding Kanto region. On foot, by bicycle or hiking, this book not only takes you to the main tourist spots, but also countless off-the-beaten-track spots. From famous historical landmarks such as the Imperial Palace to modern attractions like the Tokyo Skytree, this travel book offers something for any kind of person, whether you’re a visitor to Japan or living in the capital.</p> <p><strong>Fully up-to-date, Tokyo Outdoors contains:</strong></p> <p>- <strong>45 walks, cycling rides and hikes</strong> in and near Tokyo,</p> <p>- <strong>Hundreds of insider tips</strong> from a writer who has lived in the city for more than 10 years,</p> <p>- <strong>12 day trips</strong> that include Yokohama, Nikko, Kamakura, Enoshima and Karuizawa,</p> <p>- More than <strong>40 detailed print maps</strong>,</p> <p>- <strong>Online maps</strong> included for use on the go, with additional recommendations for food and drink, shopping, temples and shrines,</p> <p>- <strong>Beautiful color photos</strong> offer an impression of the amazing sights you’ll visit,</p> <p>- Recommended <strong>restaurants</strong> and <strong>cafes</strong>,</p> <p>- A simplified Tokyo <strong>subway map</strong>,</p> <p>- Super easy to use with a <strong>train pass</strong>, as each itinerary starts and ends at a railway station,</p> <p>- <strong>Festivals and events calendar</strong>, based on locations in the book,</p> <p>- Lists of the best <strong>cherry blossom</strong> and <strong>autumn leaves</strong> spots,</p> <p>- Top 5 lists for various interests, such as history, culture, shopping, art and museums.</p> <p><strong>Editorial Reviews</strong></p> <p>"Useful suggestions about how to spend some enjoyable free days in Tokyo and its surrounding areas, without splashing out much cash." <em>- Marshall Hughes, Goods From Japan</em></p> <p>"I will be keeping this book for my next trip, and look forward to being able to explore Tokyo like a local, with Baxter's help." <em>- Mike Henderson, LibraryThing</em></p> <p>"I would recommend this book to anyone visiting Tokyo that wants to get a little off the beaten path and do some exploring on foot or by bike. While years ago I frequented many of the areas covered in the book, I wish it had been available then as several times I found myself wishing I had known about something amazing that was just a couple of block from where I had been." <em>- Paul Russell, LibraryThing</em></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,199円
|

Busnes Perchnogion Canllaw Cyfoes i Hysbysebu Talu Cyflwyniad Cychwyn Cyflym i Hysbysebion Google, Facebook, Instagram, YouTube, a TikTok【電子書籍】[ Neil King ]
楽天Kobo電子書籍ストア
|
<p><strong>Ydych chi'n gyfredol ar sut gall llwyfannau hysbysebu taledig modern eich helpu i dyfu'ch busnes a lledaenu'ch neges?</strong></p> <p>Os nad ydych, plymiwch i fyd deinamig hysbysebion ar-lein gyda'r <em>Canllaw Modern i Hysbysebu Taledig ar gyfer Perchnogion Busnes: Cyflwyniad Cychwyn Cyflym i Hysbysebion Google, Facebook, Instagram, YouTube, a TikTok.</em></p> <p>Mae'r llawlyfr cychwyn cyflym byr hwn yn cynnig mewnwelediadau ymarferol i lwyfannau hysbysebu Google, Facebook, Instagram, YouTube a TikTok.</p> <p>Dysgwch sut i greu cop?au hysbysebu buddugol, dylunio llwybrau effeithiol, ac optimeiddio ar gyfer yr adenillion gorau ar fuddsoddiad.</p> <p>P'un a ydych yn farchnata profiadol neu'n berchennog busnes sy'n camu i'r byd digidol, mae'r canllaw hwn yn allwedd i'ch llwyddiant hysbysebu. <strong>Dechreuwch droi cliciau yn gwsmeriaid heddiw!</strong></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
829円
|

Blockchain-based Cyber Security Applications and Paradigms【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security attacks by considering real-time applications based on IoT, Wireless Sensor Networks, Cyber-Physical Systems, and Smart Grids. The book is useful for academicians and research scholars worldwide working in cyber security. It is also useful for industry experts working in cyber security.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
4,062円
|

Effective Angular Develop applications of any size by effectively using Angular with Nx, RxJS, NgRx, and Cypress【電子書籍】[ Roberto Heckers ]
楽天Kobo電子書籍ストア
|
<p><b>Develop your front-end expertise and build scalable, enterprise-ready web applications by efficiently using the Angular framework's powerful features and essential libraries</b></p><h2>Key Features</h2><ul><li>Implement design patterns and Nx for optimal maintainability and scalability of your code base</li><li>Explore reactive programming and state management using RxJS, Signals, and NgRx</li><li>Build and test large-scale Angular monorepo applications using Nx, Jest, and Cypress</li><li>Purchase of the print or Kindle book includes a free PDF eBook</li></ul><h2>Book Description</h2>Angular is an open-source, front-end framework used to build web applications using TypeScript. Angular is a component-based framework, which means you build apps by developing and composing reusable components. This framework has all the built-in features needed to develop complex, feature-rich web apps. Written by an Angular specialist working with some of the top companies in the Netherlands, this book teaches you how to harness the full potential of the Angular framework. You’ll explore different front-end architecture designs and set up a scalable environment for Angular applications and libraries using Nx, before taking a deep dive into the framework's newest and most powerful features. Next, you’ll learn to manipulate the Document Object Model (DOM) with Angular directives, pipes, and animations, and build reusable components like a pro. The book spotlights best practices and flags potential pitfalls at every step of the way. You’ll also learn design patterns that fit well when using the Angular framework, reactive programming with RxJS and Angular signals, and how to manage application states effectively. The book teaches you about accessibility, testing, and optimizing your app for deployment. By the end of this book, you’ll be able to use Angular effectively to build enterprise-ready, scalable front-end applications.<h2>What you will learn</h2><ul><li>Create Nx monorepos ready to handle hundreds of Angular applications</li><li>Reduce complexity in Angular with the standalone API, inject function, control flow, and Signals</li><li>Effectively manage application state using Signals, RxJS, and NgRx</li><li>Build dynamic components with projection, TemplateRef, and defer blocks</li><li>Perform end-to-end and unit testing in Angular with Cypress and Jest</li><li>Optimize Angular performance, prevent bad practices, and automate deployments</li></ul><h2>Who this book is for</h2><p>If you are a front-end engineer ready to level up your Angular skills, then this book is for you. This book will help you learn how to build applications of any scale by utilizing the powerful features of the Angular framework. Basic knowledge of the Angular framework will enable you to grasp the concepts explained in this book, including the newest Angular features such as standalone components, Signals, control flow, front-end architecture, building Angular monorepo applications using Nx, reactive programming with RxJS, and managing application state with NgRx.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
3,444円
|

Cyber Security and Digital Forensics: Select Proceedings of the International Conference, Redcysec 2 CYBER SECURITY & DIGITAL FOREN (Lecture Notes in Networks and Systems) [ Nihar Ranjan Roy ]
楽天ブックス
|
CYBER SECURITY & DIGITAL FOREN Lecture Notes in Networks and Systems Nihar Ranjan Roy Sudeep Tanwar Usha Batra SPRINGER NATURE2024 Paperback 2024 English ISBN:9789819998104 洋書 Computers & Science(コンピューター&科学) Computers
|
57,970円
|

Fascination: Honeypots and Cybercrime【電子書籍】[ Armin Snyder ]
楽天Kobo電子書籍ストア
|
<p>In an increasingly networked and digitalized world, the topic of cybercrime is becoming more and more important. Cybercriminals use advanced technologies to carry out devastating attacks on companies, governments and individuals. One method used to detect and defend against such attacks is honeypots. In this paper, we will take a closer look at honeypots and their role in the context of cybercrime.</p> <p>Honeypots: An Introduction:<br /> Honeypots are specially designed systems or network components designed to lure, deceive and analyze attackers. They are presented as attractive targets to attract the attention of cybercriminals. Since honeypots are not part of the productive infrastructure, they offer the opportunity to study attack behavior, recognize tactics and identify vulnerabilities.</p> <p>Types of Honeypots:<br /> There are different types of honeypots that can be classified depending on their complexity and purpose:</p> <p>Low-Interaction Honeypots: These honeypots simulate only limited services and protocols to allow minimal interactions with attackers. They are easy to set up, but also contain less attack information.<br /> High-Interaction Honeypots: These honeypots provide more comprehensive emulation of systems and services. They enable more detailed analysis of attacker activity, but are more difficult to implement and maintain.<br /> Research Honeypots: These honeypots are used to investigate specific attack patterns and techniques. They are tailor-made and enable in-depth analysis of threats.</p> <p>The Role of Honeypots in Fighting Cybercrime:<br /> Honeypots play an essential role in combating cybercrime.<br /> Early detection of attacks: By attracting attackers, honeypots enable early detection of attacks and attack trends.</p> <p>Behavior analysis. Analyzing attacker interactions provides valuable insights into their tactics, techniques and procedures.<br /> Distraction from productive systems.<br /> Honeypots distract attackers from actual production environments, increasing security.<br /> Honeypot networks: By connecting honeypots, more comprehensive attack scenarios can be simulated in order to develop better protection mechanisms.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
250円
|

Synthesis of Medium-Sized Cycloalkenes via Fused-Cyclobutenes【電子書籍】[ Tomohiro Ito ]
楽天Kobo電子書籍ストア
|
<p>This book explains the existence of the intermediate using two approaches: computational chemistry and coordination chemistry. In this book, the author has developed new methods for synthesizing medium-sized cycloalkenes by utilizing the 4π-electrocyclic reaction of fused-cyclobutenes. The fundamental and most important strategy and feature of the work are as follows: first, cyclobutene is used as a readily available raw material with high-strain energy to generate more strained medium-sized <em>cis,trans</em>-cycloalkadiene molecules. Second, by judiciously selecting the reaction conditions, the short-lived intermediate (medium-sized <em>cis,trans</em>-cycloalkadiene) can be converted to medium-sized <em>cis</em>- or <em>trans</em>-cycloalkenes. For the former, the generation of the medium-sized <em>cis,trans</em>-cycloalkadiene intermediate is greatly affected by the substituent on the cyclobutene, and there are few examples of its generation confirmed at room temperature. Regarding the latter, the synthesis of <em>trans</em>-cycloalkenes is noteworthy in terms of establishing a new synthetic methodology and providing one of the few asymmetric synthesis methods, which has not been achieved before. Readers of this book can gain novel insights into strained molecules involved not only in small-sized cycloalkenes but also in medium-sized ones.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
24,309円
|

Towards a Peaceful Development of Cyberspace De-Escalation of State-Led Cyber Conflicts and Arms Control of Cyber Weapons【電子書籍】[ Thomas Reinhold ]
楽天Kobo電子書籍ストア
|
<p>The cyberspace and its global infrastructures are essential for our civilizations, the economy and administration. However, cyberspace is also increasingly developing into an intelligence and military operational area, visible in the creation of military cyber departments and the integration of cyberspace into states' security and defense strategies. Unfortunately, many of the established toolset of transparency, de-escalation and arms control measures do not work for cyberspace due to its specific technical characteristics. But how de-escalation of state-led conflicts in cyberspace can be achieved and how arms control of cyber weapons can be developed? Based on a technical perspective with regard to the underlying political challenges, the book follows an approach of adopting already existing technical measures from other fields of the computer science. It presents a classification system for cyberweapons, an approach for the mutual reduction of vulnerability stockpiles and provides an approach to prove the non-involvement in a cyber conflict. Beyond this, it aims to provide some impulses regarding the responsibility and creative options of the computer science with a view to the peaceful development and use of cyberspace.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
14,585円
|

Canllaw i Fuddsoddi yn y Farchnad Cyfranddaliadau ar gyfer Pobl Ifanc Sut i Sicrhau Bywyd o Ryddid Ariannol drwy Rym Buddsoddi.【電子書籍】[ Jon Law ]
楽天Kobo電子書籍ストア
|
<p>Buddsoddi yw'r peth gorau y gall pobl ifanc ei wneud i feithrin cyfoeth tymor hir a dod yn ariannol rydd. Mae dysgu celfyddyd masnachu cyfranddaliadau, yn ogystal ?'r pwnc cysylltiedig o reoli arian mor bwysig, ac fe fydd yr iau y byddant yn dysgu, gwell fydd hynny.</p> <p>Ysgrifennwyd y llyfr hwn gan berson ifanc ar gyfer pobl ifanc, ac mae'n ymdrin ? phopeth y bydd angen i berson ifanc ei wybod i'w baratoi ar gyfer llwyddo yn y farchnad gyfranddaliadau. Mae'r chwe adran ganlynol yn rhannu'r llyfr:</p> <ul> <li>Rhan I: Manteision</li> <li>Rhan II: Cychwyn</li> <li>Rhan III: Llythrennedd y Farchnad Gyfranddaliadau</li> <li>Rhan IV: Strategaeth y Farchnad Gyfranddaliadau</li> <li>Rhan V: Yn Ymarferol (Bywyd Go Iawn)</li> <li>Rhan VI: Adnoddau a Gwybodaeth Bellach.</li> </ul> <p>Mae'r llyfr hefyd yn cyflwyno cysyniadau cyllideb bersonol, arbed arian, a gwneud arian, yn ogystal ? darparu enghreifftiau concrid o fywyd go iawn, a doethineb gan y buddsoddwyr llwyddiannus yn y byd.</p> <p>Fel awdur, ysgrifennais y llyfr hwn fel y gall buddsoddi newid bywydau pobl eraill fel y newidiodd fy mywyd innau. Waeth pwy ydych chi, pa oed ydych chi, a pha swm o arian sydd gennych, gallwch fuddsoddi, a bydd y llyfr hwn yn eich helpu i wneud hynny.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
415円
|

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection【電子書籍】
楽天Kobo電子書籍ストア
|
<p><strong>APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION</strong></p> <p><strong>Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML)</strong></p> <p><em>Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection</em> is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning. The text clearly explains theoretical aspects, framework, system architecture, analysis and design, implementation, validation, and tools and techniques of data science and machine learning to detect and prevent cyber threats.</p> <p>Using AI and ML approaches, the book offers strategic defense mechanisms for addressing malware, cybercrime, and system vulnerabilities. It also provides tools and techniques that can be applied by professional analysts to safely analyze, debug, and disassemble any malicious software they encounter.</p> <p>With contributions from qualified authors with significant experience in the field, <em>Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection</em> explores topics such as:</p> <ul> <li>Cybersecurity tools originating from computational statistics literature and pure mathematics, such as nonparametric probability density estimation, graph-based manifold learning, and topological data analysis</li> <li>Applications of AI to penetration testing, malware, data privacy, intrusion detection system (IDS), and social engineering</li> <li>How AI automation addresses various security challenges in daily workflows and how to perform automated analyses to proactively mitigate threats</li> <li>Offensive technologies grouped together and analyzed at a higher level from both an offensive and defensive standpoint</li> </ul> <p>Providing detailed coverage of a rapidly expanding field, <em>Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection</em> is an essential resource for a wide variety of researchers, scientists, and professionals involved in fields that intersect with cybersecurity, artificial intelligence, and machine learning.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
14,706円
|

Understanding Checksums and Cyclic Redundancy Checks【電子書籍】[ Philip Koopman ]
楽天Kobo電子書籍ストア
|
<p>Understanding Checksums and Cyclic Redundancy Checks:<br /> This book gives practical, comprehensive answers to common questions about checksums and CRCs. Descriptions are based mainly on intuitive rather than mathematical explanations for both algorithmic operation and limitations, improving accessibility to non-specialists. Coverage includes single-sum checksums, dual-sum checksums (Fletcher checksum, DualX, DualXP), the new Koopman checksum, Cyclic Redundancy Checks (CRCs), and system-level usage considerations.</p> <p>For decades much of the practical use of checksums and CRCs was based, at least in part, on folklore. This book provides a solid, comprehensive foundation for addressing core issues such as the comparative fault detection effectiveness of each technique, insight into speed differences, intuitive explanations for how speed-up techniques work, which CRC polynomial you should use for any particular situation, and source code examples for each approach.</p> <p>This is the most comprehensive treatment of checksums and CRCs to date. The emphasis is on intuitive explanations and empirical validation of insights for practical application of these techniques to addressing real-world problems.</p> <p>Chapters:</p> <ol> <li>Introduction</li> <li>Decimal checksum examples</li> <li>Checksum operation and terminology</li> <li>Checksum fault model</li> <li>Single-sum checksums</li> <li>Dual-sum checksums (Fletcher, Adler, DualX)</li> <li>Koopman checksum</li> <li>Checksum plus parity for HD=4 (KoopmanP, DualXP)</li> <li>Cyclic Redundancy Check (CRC)</li> <li>CRC effectiveness</li> <li>Other checksum considerations</li> <li>System-level considerations</li> <li>Resources</li> <li>Conclusions</li> <li>Appendix: Good CRC Polynomials</li> <li>Glossary</li> </ol> <p>Includes example source code in C for each type of checksum.<br /> This e-book is best viewed in color, with some color-coded text and dozens of color illustrations.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,544円
|

Hacked The Secrets Behind Cyber Attacks【電子書籍】[ Dr Jessica Barker ]
楽天Kobo電子書籍ストア
|
<p><strong>When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats.</strong></p> <p>***Hacked***offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert <strong>Jessica Barker</strong> uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.</p> <p>Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions.</p> <p>From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with <em><strong>Hacked.</strong></em></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
2,343円
|

Bully 2.0 A Studied Contrast between Traditional and Cyberbullying【電子書籍】[ Willow R. ]
楽天Kobo電子書籍ストア
|
<p>"Bully 2.0: A Studied Contrast between Traditional and Cyberbullying" offers a comprehensive, thoughtful, and analytical view into the pervasive world of bullying in the digital age. The evolution of bullying practices has never been so meticulously explored and dissected, shedding light on the fundamental transformations from traditional, face-to-face confrontations to the anonymous virtual attacks rampant today.</p> <p>The book embarks on a journey of understanding both the traditional and cyber form of bullying, integrating the psychological motives, and societal factors contributing to their prevalence.</p> <p>You will explore the defining elements and distinctive strategies of both forms of bullying, along with the complex psychology of aggressors and victims. The role of bystanders, facelessness in cyberspace, and the potent impact of social media platforms forms the crux of the issue.</p> <p>Further, the book dives deep into the legal aspects, decisions, and implications associated with cyberbullying, an increasing global concern. Global movements against cyberbullying, country-specific legislations, preventative measures, and various resources available for help, including niches like digital etiquette and safe internet practices are well delineated.</p> <p>The roles of schools, educators, parents are also discussed, highlighting their significance in the prevention and control of cyberbullying. Comprehensive case studies, both national and international, are provided to enable a holistic understanding of the outcomes and resolutions pertaining to these cyber crimes.</p> <p>The book also alerts the reader to the potential future of cyberbullying and the direction the digital world is tending towards, concluding with a repository of resources and support available for victims and educators alike to combat this social menace.</p> <p>"Bully 2.0: A Studied Contrast between Traditional and Cyberbullying" is an enlightening read for anyone looking for a deeper understanding of the complex world of bullying, offering nuggets of wisdom and sound advice on how to tackle these challenges. It’s a resourceful guide, a salient reference, and an integral tool for educators, psychologists, parents, and anyone affected by this global malaise. Uncover the sinister side of the digital world and arm yourself with the knowledge to confront and defeat it. Bolster your toolkit against bullying with this unparalleled guide today.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
887円
|

Cyber Security and Digital Forensics Select Proceedings of the International Conference, ReDCySec 2023【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
18,231円
|

Challenged Sovereignty The Impact of Drugs, Crime, Terrorism, and Cyber Threats in the Caribbean【電子書籍】[ Ivelaw Lloyd Griffith ]
楽天Kobo電子書籍ストア
|
<p>The drug trade. Crime. Terrorism. Cyber threats. In the Caribbean, these cross-border Problems Without Passports (PWPs) have shaken the very foundation of nation states. Blending case studies with regional analysis, Ivelaw Lloyd Griffith examines the regionwide impact of PWPs and the complex security and sovereignty issues in play. The interaction of local and global forces within PWPs undermines the governments’ basic goal of protecting their people against military threats, subversion, and the erosion of political, economic, and social values. Seeking solutions to these multidimensional threats requires addressing both traditional and non-traditional security and sovereignty issues. Griffith focuses on clashes between PWPs and the state from warring drug gangs in Jamaica, to Trinidad and Tobago’s one-time status as a center for terrorism-related activities, to the political resurgence of drug trafficker Desi Bouterse in Suriname, and the growing cyber threats across the region.</p> <p>Informed and up to date, <em>Challenged Sovereignty</em> explains the effects of today’s globalized problems on the contemporary Caribbean.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
2,598円
|

Heights of Madness In 92 days I walked and cycled 5,000 miles and climbed the highest peak of every county in the UK...What was i thinking【電子書籍】[ Jonny Muir ]
楽天Kobo電子書籍ストア
|
<p>Born in 1981 and raised in Bromsgrove, Worcestershire, Jonny Muir's early wanderings took him over the Lickey Hills, before he graduated to the giddier heights of the Lake District and Snowdonia.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
770円
|

BattleSpace of Mind AI and Cybernetics in Information Warfare【電子書籍】[ Michael Joseph McCarron ]
楽天Kobo電子書籍ストア
|
<p>The Nazi's never surrendered and planned their 4th Reich using neurocognitive weapons. Going underground their technology made it's way to S. America, the Soviet Union, the United States, among other places. We all are bound by the new rules of corporate fascism, long planned by Himmler, and his main strategy for a 4th Reich, financial control. Are we all just living in a computer-controlled information battlespace continued from World War II? This book dissects the matrix of control used by advanced military industrial powers; it breaks down the technology bit by bit so you have an understanding how technology is being used in a battle for your mind. I address these issues from a veteran's insight as a former Signal Intelligence specialist and with some background in the Intelligence Community, I bring forth countermeasures to this control, showing you how you can safeguard your mind from these attacks. Countermeasures that are not available anywhere in the commercial world, yet without them you will be easy prey for these directed targeted pulse modulated attacks first used by the Nazis.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
294円
|

This Book Is Overdue! How Librarians and Cybrarians Can Save Us All【電子書籍】[ Marilyn Johnson ]
楽天Kobo電子書籍ストア
|
<p>In <em>This Book is Overdue!,</em> acclaimed author Marilyn Johnson celebrates libraries and librarians, and, as she did in her popular first book, <em>The Dead Beat</em>, discovers offbeat and eloquent characters in the quietest corners. In defiance of doomsayers, Johnson finds librarians more vital and necessary than ever, as they fuse the tools of the digital age with love for the written word and the enduring values of truth, service to all, and free speech. <em>This Book Is Overdue!</em> is a romp through the ranks of information professionals who organize our messy world and offer old-fashioned human help through the maze.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,440円
|
|