369 |
Tangible User Interfaces: Past, Present and Future Directions |
Global Now |
Computing and Processing |
2010 |
Open
|
370 |
Temporal Information Retrieval |
Global Now |
Computing and Processing |
2015 |
Open
|
371 |
Tensor Networks for Dimensionality Reduction and Large-scale Optimization: Part 2 Applications and Future Perspectives |
Global Now |
General Topics for Engineers |
2017 |
Open
|
372 |
Tensor Regression |
Global Now |
Computing and Processing |
2021 |
Open
|
373 |
Test Collection Based Evaluation of Information Retrieval Systems |
Global Now |
Computing and Processing |
2010 |
Open
|
374 |
The Algorithmic Foundations of Differential Privacy |
Global Now |
Computing and Processing |
2014 |
Open
|
375 |
The Appearance of Human Skin: A Survey |
Global Now |
Bioengineering; Computing and Processing |
2007 |
Open
|
627 |
The Art of Attack: Attacker Mindset for Security Professionals |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2021 |
Open
|
628 |
The Art of War in the Network Age: Back to the Future |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2016 |
Open
|
629 |
The CISO Evolution: Business Knowledge for Cybersecurity Executives |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2022 |
Open
|
376 |
The Computer Self-Efficacy Construct: A History of Application in Information Systems Research |
Global Now |
Components, Circuits, Devices and Systems; Computing and Processing |
2022 |
Open
|
630 |
The Cybersecurity Guide to Governance, Risk, and Compliance |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2024 |
Open
|
631 |
The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2019 |
Open
|
632 |
The Data Science Handbook |
Global Wiley |
Computing and Processing |
2025 |
Open
|
377 |
The Design and Implementation of Modern Column-Oriented Database Systems |
Global Now |
Computing and Processing |
2013 |
Open
|
378 |
The Design of Competitive Online Algorithms via a Primal-Dual Approach |
Global Now |
Computing and Processing |
2009 |
Open
|
633 |
The DevSecOps Playbook: Deliver Continuous Security at Speed |
Global Wiley |
Computing and Processing |
2024 |
Open
|
634 |
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity |
Global Wiley |
Computing and Processing |
2019 |
Open
|
379 |
The Era of Big Spatial Data: A Survey |
Global Now |
Computing and Processing |
2016 |
Open
|
380 |
The Evolution of TV Systems, Content, and Users Towards Interactivity |
Global Now |
Computing and Processing |
2009 |
Open
|
635 |
The Fitness of Information: Quantitative Assessments of Critical Evidence |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2014 |
Open
|
381 |
The Foundations for Provenance on the Web |
Global Now |
Computing and Processing |
2010 |
Open
|
382 |
The Foundations of a Trustworthy Web |
Global Now |
Communication, Networking and Broadcast Technologies; Computing and Processing |
2013 |
Open
|
636 |
The Language of Deception: Weaponizing Next Generation AI: Weaponizing Next Generation AI |
Global Wiley |
Computing and Processing |
2024 |
Open
|
637 |
The Official (ISC)2 CCSP CBK Reference |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2021 |
Open
|
638 |
The Official (ISC)2 CISSP CBK Reference |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2021 |
Open
|
639 |
The Official (ISC)2 SSCP CBK Reference |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2020 |
Open
|
383 |
The Path to Path-Traced Movies |
Global Now |
Computing and Processing; Photonics and Electrooptics; General Topics for Engineers |
2016 |
Open
|
640 |
The Pentester BluePrint: Starting a Career as an Ethical Hacker |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2021 |
Open
|
384 |
The Probabilistic Relevance Framework |
Global Now |
Computing and Processing |
2009 |
Open
|
385 |
The Psychophysiology Primer: A Guide to Methods and a Broad Review with a Focus on Human?Computer Interaction |
Global Now |
Bioengineering |
2016 |
Open
|
641 |
The Read Aloud Cloud: An Innocent's Guide to the Tech Inside |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2021 |
Open
|
642 |
The Real Work of Data Science: Turning data into information, better decisions, and stronger organizations |
Global Wiley |
Computing and Processing |
2019 |
Open
|
386 |
The Roles and Modes of Human Interactions with Automated Machine Learning Systems: A Critical Review and Perspectives |
Global Now |
Computing and Processing |
2023 |
Open
|
387 |
The Security & Privacy Acceptance Framework (SPAF) |
Global Now |
Computing and Processing |
2023 |
Open
|
388 |
The Technological Emergence of AutoML: A Survey of Performant Software and Applications in the Context of Industry |
Global Now |
Computing and Processing |
2024 |
Open
|
389 |
The Trustworthy and Trusted Web |
Global Now |
Computing and Processing |
2011 |
Open
|
643 |
The Uncertain Digital Revolution |
Global Wiley |
Computing and Processing |
2016 |
Open
|
390 |
The Web Economy: Goods, Users, Models, and Policies |
Global Now |
Computing and Processing |
2012 |
Open
|
644 |
The Wiley 5G REF: Security |
Global Wiley |
Communication, Networking and Broadcast Technologies; Computing and Processing |
2021 |
Open
|
391 |
The Zero-trust Paradigm: Concepts, Architectures and Applications |
Global Now |
Computing and Processing |
2025 |
Open
|
392 |
Theory of Disagreement-Based Active Learning |
Global Now |
Computing and Processing |
2014 |
Open
|
645 |
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks |
Global Wiley |
Computing and Processing |
2022 |
Open
|
646 |
Threat Modeling: Designing for Security |
Global Wiley |
Computing and Processing; Components, Circuits, Devices and Systems |
2014 |
Open
|
393 |
Towards A Unified Understanding of Technology Resistance and Avoidance: A Holistic View on Extant Literature and Agenda for Future Research |
Global Now |
Computing and Processing |
2025 |
Open
|
394 |
Towards Better User Studies in Computer Graphics and Vision |
Global Now |
Computing and Processing |
2023 |
Open
|
395 |
Tracking on the Web, Mobile and the Internet of Things |
Global Now |
Computing and Processing; Communication, Networking and Broadcast Technologies; Components, Circuits, Devices and Systems |
2022 |
Open
|
647 |
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2019 |
Open
|
648 |
Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2022 |
Open
|
396 |
Trends in Cleaning Relational Data: Consistency and Deduplication |
Global Now |
Computing and Processing |
2015 |
Open
|
397 |
Trends in Explanations: Understanding and Debugging Data-driven Systems |
Global Now |
Components, Circuits, Devices and Systems; Computing and Processing |
2021 |
Open
|
649 |
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2020 |
Open
|
650 |
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2019 |
Open
|
651 |
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2020 |
Open
|
652 |
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2019 |
Open
|
653 |
Trust in Computer Systems and the Cloud |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2022 |
Open
|
398 |
Trust on the World Wide Web: A Survey |
Global Now |
Computing and Processing |
2008 |
Open
|
399 |
Tutorial on Amortized Optimization |
Global Now |
Computing and Processing; General Topics for Engineers |
2023 |
Open
|
400 |
Tutorial on Static Inference of Numeric Invariants by Abstract Interpretation |
Global Now |
Computing and Processing |
2017 |
Open
|