1230~1231_架空犯【在場證明版】
1231~0102_金網寒假動漫節

英文書 > 全部商品

Web Development

2025/11/26 出版
9 特價1520
立即代訂
下次再買

CompTIA Security+ Last Minute Revision

Xandar,Pelin  著
Gitforgits 出版
2025/11/26 出版
9 特價2394
立即代訂
下次再買

Cybersecurity - A Broad Perspective

2025/11/24 出版
9 特價3078
立即代訂
下次再買

Cybersecurity for 2025

2025/11/23 出版
9 特價1520
立即代訂
下次再買

Cult of the Dead Cow

Joseph,Menn  著
PublicAffair 出版
2025/11/21 出版

The shocking untold story of the elite secret society of hackers fighting to protect our freedom, "a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age" (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest active, most respected, and most famous American hacking group of all time. With its origins in the earliest days of the internet, the cDc is full of oddball characters--activists, artists, and musicians--some of whom went on to advise presidents, cabinet members, and CEOs, and who now walk the corridors of power in Washington and Silicon Valley. Today, the group and its followers are battling electoral misinformation, making personal data safer, and organizing to keep technology a force for good instead of for surveillance and oppression. Now featuring a new afterword with updates on the collective, Cult of the Dead Cow describes how, at a time when governments, corporations, and criminals hold immense power, a small band of tech iconoclasts is on our side fighting back.

9 特價650
立即代訂
下次再買

Social Media & Child Safety

2025/11/20 出版
9 特價342
立即代訂
下次再買

The Invisible Wars

Vij Books 出版
2025/11/11 出版
9 特價2048
立即代訂
下次再買

Practical C++23 Backend Programming, Second Edition

Gitforgits 出版
2025/11/11 出版
9 特價2394
立即代訂
下次再買

Practical GRC Implementation

SPD 出版
2025/11/10 出版
9 特價2052
立即代訂
下次再買

That So Evelyn, The Blog

2025/11/08 出版
9 特價274
立即代訂
下次再買

The Dark Web and Scams

Ivette,Smith  著
Ivette Smith 出版
2025/11/07 出版
9 特價650
立即代訂
下次再買

WebAssembly 2.0 Essentials, Second Edition

Gitforgits 出版
2025/11/07 出版
9 特價2394
立即代訂
下次再買

Building Accessible Web Experiences with AI

Cognifi Media 出版
2025/11/04 出版
9 特價445
立即代訂
下次再買

The Global Prompt Engineer

2025/11/01 出版
9 特價1520
立即代訂
下次再買

Digital Product Accessibility

2025/11/01 出版
9 特價1520
立即代訂
下次再買

Decoding Chatgpt and Artificial Intelligence

2025/10/18 出版
9 特價684
立即代訂
下次再買

Web Programming with Go, Second Edition

Ian,Taylor  著
Gitforgits 出版
2025/10/17 出版

This is a new edition of "Web Programming with Go" and it's designed to help both entry-level and professional developers build and launch functional web applications using Go's core libraries. Every chapter gives you practical lessons, from setting up Go projects and building strong backend routes to frontend-backend integration, session management, authentication, concurrency, and connecting external APIs.This book is a hands-on way to learn key skills like testing, logging, error handling and performance tuning, all explained in simple, direct language. The real code and examples make it easy to understand and use the concepts. It covers nearly every major aspect of Go web development, but keeps examples straightforward and avoids complex edge cases, making it ideal for learners and practitioners who want clarity and reliable progress. You'll learn to structure projects, design backend services, manage sessions, secure authentication, and integrate external APIs with step-by-step Bookstore examples. It's got clear, practical techniques for routing, concurrency, testing, logging, performance and error handling, and it uses code that's easy to understand and explanations that are easy to follow.Basically, this book looks at modern Go features without getting into complicated or niche scenarios, making the lessons useful for real projects. This edition makes it easy for you to get from setup to deployment by focusing on simplicity over unnecessary detail.Key FeaturesGet your web projects sorted with Go, using organised code, a modular design, and real-world workflows.You'll build, secure and test RESTful APIs using Go's net/http, Gorilla Mux and JSON best practices.Put in place user authentication, role-based access, and strong password protection to make sure your users have a safe experience.Get the front end and back end talking to each other by having clear API contracts and simple JSON data interchange practices.Use Go's concurrency tools to boost performance, scale up data fetching, and avoid deadlocks.Mock databases, APIs, and dependencies for fast, isolated, and reliable automated test routines.Set up session management, secure cookies, and resilient authentication flows to keep users logged in.Keep an eye on, log and trace application events to quickly find and fix problems.Use Go's HTTP client patterns to integrate payment gateways, external APIs, and third-party services.Come up with easy-to-understand error messages and stick to the standard incident response plans.Table of ContentIntroduction to Web Development in GoStructuring Go Web ApplicationHandling HTTP Requests and RoutingTemplating and Rendering ContentInteraction with DatabasesConcurrency in GoSessions, Authentication, and AuthorizationFrontend and Backend CommunicationTesting and Debugging

9 特價2394
立即代訂
下次再買

Networking for System Administrators

2025/10/17 出版

"One of the best technical writers in the networking and security environments." - Midwest Book ReviewStop waiting for the network team!If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network-once they know how to unlock it.Most sysadmins don't need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you: How modern networks really workThe essentials of TCP/IPThe core of IPv4 and IPv6The right tools to diagnose network problems, and how to use themTroubleshooting everything from the physical wire to DNSHow to see the traffic you send and receiveConnectivity testingHow to communicate with your network team to quickly resolve problemsA sysadmin doesn't need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues will transforms a good sysadmin into a great one.The first edition of Networking for System Administrators unlocked networking for hundreds of thousands of sysadmins. This second edition promises the same, and more!

9 特價2632
立即代訂
下次再買

Networking for System Administrators

2025/10/16 出版

"One of the best technical writers in the networking and security environments." - Midwest Book ReviewStop waiting for the network team!If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network-once they know how to unlock it.Most sysadmins don't need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you: How modern networks really workThe essentials of TCP/IPThe core of IPv4 and IPv6The right tools to diagnose network problems, and how to use themTroubleshooting everything from the physical wire to DNSHow to see the traffic you send and receiveConnectivity testingHow to communicate with your network team to quickly resolve problemsA sysadmin doesn't need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues will transforms a good sysadmin into a great one.The first edition of Networking for System Administrators unlocked networking for hundreds of thousands of sysadmins. This second edition promises the same, and more!

9 特價1754
立即代訂
下次再買

How to Hack

2025/10/13 出版

Unlock the secrets of cyber mastery with "How to Hack" by Silas Montrose (ISBN: 9781998332779).Dive into a comprehensive, beginner-friendly guide to hacking, cybersecurity, and ethical hacking. Discover cutting-edge strategies, real-world case studies, and expert insights into the future of technology and digital security. Perfect for aspiring hackers, IT professionals, and anyone eager to understand the impact of hacking on society, innovation, and governance. Equip yourself with crucial knowledge on ethical considerations, resilience, and the evolving landscape of cyber threats. Start your journey to becoming a cybersecurity expert today!

9 特價1197
立即代訂
下次再買

Hacking for Dummies

Kevin,Beaver  著
For Dummies 出版
2025/10/10 出版

Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the Internet of Things (IoT), and the security implications of hybrid work. Understand the tools hackers use to steal sensitive data from individuals and businesses Discover methods of protecting your information--including improving your security, recognizing phishing scams, and more Assess your current network and cloud configurations from a hacker's perspective using proven vulnerability and penetration testing techniques Defend against AI-generated scams, lost devices, and other common threats Hacking For Dummies is for anyone looking to protect their devices from hacking--at home, at the office, or anywhere in-between.

9 特價1026
立即代訂
下次再買

TVOnline Last Public Chat Transcript

2025/10/08 出版

Long before social media and endless scrolls, there was TVOnline-a pioneering graphical bulletin-board system run by TVOntario on the FirstClass platform. Born of the same SoftArc innovation that sprouted EduNet in 1990, it brought real-time chat, email and file sharing to educators, students and activists across Ontario . At its heart was a volunteer-driven community, logging in over dial-up modems to swap ideas, troubleshoot software, organize events and simply hang out in virtual caf矇s.By the mid-90s the wider Internet began to eclipse traditional BBSes, but TVOnline held on, evolving with each new version of FirstClass until, after more than a decade, the analogue world finally gave way to web-based services . On the night of March 30-31, 2002, just as Ontario's spring air hinted at renewal, the last public chat flickered to life one final time-friends logging on, offering toasts, teasing each other about kernel panics and koi ponds, then bidding a bittersweet farewell as the "server" count hit zero.Now, more than two decades later, we're proud to present the book-length transcript of that final conversation. It's a time capsule of pre-Web-2.0 community spirit-a raw, unfiltered snapshot of voices from Deborah, Michael, Matt and dozens more as they marked the end of an era and wondered what would come next. Whether you lived through the clack of 2400 baud modems or are only discovering the magic now, this volume captures the laughter, the laments, and the very human connections that once defined Ontario's most vibrant online neighborhood. And as TVO itself shifted toward fully digital learning in 2002-a year when it took on new responsibilities in distance education -this transcript stands as a monument to the playful, passionate community that thrived before the dawn of today's Internet.Participants: Deborah Azoulay, Michael Helms, Matt Charlton, Mike Lucas, Ted Brunt, Brian Elston, Carol Biberstein, Rob&Tracy Wells, George Nassas, Laura Cooper, Phil Lewin, Julie Weatherbee, marc bishop, Martin Ahermaa, Lynda Chiotti, Daphne Goold, Jackie Crawford, OL-Joanne Souaid, Andrew P. Lewin, Renaud Joubert, Eduardo Valdez, Steve Davenport, David McLachlan, Don Presant, Gobie Mahalin, Ralph Chou, George Geist, Vinu Bhagwandeen, N M. Keogh, Justin Swift, Administrator, SantaHaslock, canadiandrums314, Alfredo Chow, Jacob Courtade, Andrew Lewin, Luis Tolentino, Luis Tolentino Jr., Victor, Michael J. Helms, Matthew Charlton, Madison Charlton, hellkeepers.

9 特價2394
立即代訂
下次再買

Wars Without Flags

Rowan,Hale  著
Vij Books 出版
2025/10/07 出版

War no longer wears a uniform. From the battlefields of Ukraine to the deserts of Africa and the networks of cyberspace, power is being fought over in ways most of the world barely sees. Militias, private armies, and cyber mercenaries are replacing traditional forces, while AI warfare and disinformation reshape the very idea of sovereignty. Violence has become deniable, outsourced, and profitable-a shadow marketplace of force where loyalty is bought and borders are irrelevant.This book pulls back the curtain on the world of proxy warfare, exposing how private military companies, hacker-for-hire groups, and autonomous weapons are redrawing the global map. Drawing on gripping case studies from today's conflicts, it explains why governments outsource war, how militias gain legitimacy, and what happens when algorithms make life-and-death decisions.For readers of geopolitics, security, technology, or current affairs, this is an urgent and accessible guide to the new face of conflict. Whether you are curious about the Wagner Group, anxious about autonomous weapons ethics, or seeking to understand the hidden forces behind gray zone conflict, this book delivers clarity where most headlines deliver noise.By the end, you'll see how these invisible wars touch business, democracy, and daily life-and why understanding them is essential to navigating the century ahead. It offers a sharper lens for interpreting world events and a deeper awareness of the risks and realities shaping tomorrow's order.This is not a distant theory of war's future. It is the inside story of the world already here-where cyber war, militia warfare, and AI-driven conflict are defining power in the twenty-first century.

9 特價2340
立即代訂
下次再買

Digital Dictatorship

Avery,Grant  著
Vij Books 出版
2025/10/07 出版

A world without chains can still be a prison. Today's most powerful regimes-whether in Beijing, Silicon Valley, or your own city-no longer rely on brute force to ensure obedience. They rely on code, algorithms, and incentives that reshape behavior so quietly that compliance feels voluntary. This is the unsettling reality of digital authoritarianism, where freedom is exchanged for convenience and control is enforced without a single shot fired.This book exposes how algorithmic governance and surveillance capitalism critique converge to create a system that rewards predictability and punishes deviation. From China's social credit system to Western experiments in predictive policing, from corporate loyalty apps to platform moderation rules, the same logic is at work: technology becomes the new architecture of power.Designed for thoughtful readers who sense that something deeper than "privacy loss" is at stake, this book connects history, psychology, and culture to reveal how societies are being trained into compliance. It challenges the belief that democracy and dictatorship are separate technological futures, showing instead how they are converging on the same system of engineered obedience.Readers will gain: - A clear framework for recognizing when convenience disguises control; - Insight into how behavioral nudging technology normalizes submission; - An understanding of how corporate surveillance and state power reinforce each other; - Practical clarity on where resistance is still possible.

9 特價2633
立即代訂
下次再買

Digital Dictatorship

Avery,Grant  著
Vij Books 出版
2025/10/07 出版

A world without chains can still be a prison. Today's most powerful regimes-whether in Beijing, Silicon Valley, or your own city-no longer rely on brute force to ensure obedience. They rely on code, algorithms, and incentives that reshape behavior so quietly that compliance feels voluntary. This is the unsettling reality of digital authoritarianism, where freedom is exchanged for convenience and control is enforced without a single shot fired.This book exposes how algorithmic governance and surveillance capitalism critique converge to create a system that rewards predictability and punishes deviation. From China's social credit system to Western experiments in predictive policing, from corporate loyalty apps to platform moderation rules, the same logic is at work: technology becomes the new architecture of power.Designed for thoughtful readers who sense that something deeper than "privacy loss" is at stake, this book connects history, psychology, and culture to reveal how societies are being trained into compliance. It challenges the belief that democracy and dictatorship are separate technological futures, showing instead how they are converging on the same system of engineered obedience.Readers will gain: - A clear framework for recognizing when convenience disguises control; - Insight into how behavioral nudging technology normalizes submission; - An understanding of how corporate surveillance and state power reinforce each other; - Practical clarity on where resistance is still possible.

9 特價2048
立即代訂
下次再買

Python Networking 101, Second Edition

Gitforgits 出版
2025/10/06 出版

If you're a developer getting into networking for the first time or an IT pro looking to build practical automation skills, this second edition gives you a clear and structured path to master essential networking concepts and become a confident, hands-on Python network administrator. If you're looking to automate repetitive networking tasks, build tools for infrastructure, or become a network administrator, you'll find this book teaching all the skills, structure, and mindset to make it happen.You'll start off by getting the basics of Python down and then quickly move on to TCP, UDP, and socket programming. You'll work with protocols like HTTP, FTP, DNS, and email, and you'll use Python to automate everyday network tasks. As you read on, you'll dive into modern network automation using Netmiko, Paramiko, and NAPALM, manage asynchronous tasks with AsyncIO, and set up monitoring and analysis workflows through SNMP, ping3, iperf3, and Locust. You'll also use SimPy to simulate networks, program firewalls, scanning, encryption, and VPNs. You'll also get to work on configuration management and orchestration using Ansible. This will teach you how to automate server and network setups, manage software lifecycles, enforce standards, and integrate Python for advanced logic.This book is all about clarity and practicality, using simple, easy-to-follow examples that work in the real world. It's not meant to deal with complicated business scenarios, but it does cover the most important, routine and common jobs of network programming.Key FeaturesLearn the basics of Python syntax and data structures for network automation.Get the hang of TCP, UDP, and socket programming for real communication tasks.Practice your skills with HTTP, FTP, DNS, and email protocols using real-world Python scripts.Set up SSH connections and device configurations using Netmiko, Paramiko, and NAPALM.Take charge of asynchronous network operations with Python's AsyncIO library.Keep an eye on, look at, and test networks using SNMP, ping3, iperf3, Locust, and SimPy.Make your network security stronger by using firewalls, scanning, SSL/TLS, and VPN configurations.Take advantage of the NAPALM and Git integration to automate your configuration management and version control.With Ansible playbooks, roles, and automation workflows, you can orchestrate server and network setups.Table of ContentIntroduction to Python and NetworkingTCP, UDP and Socket ProgrammingWorking with Application LayerExploring Network AutomationNetwork Monitoring and AnalysisNetwork Security and PythonWorking with APIs and Network ServicesNetwork Programming with AsyncIONetwork Testing and SimulationNetwork Configuration ManagementAnsible and Python

9 特價2394
立即代訂
下次再買

C++ Networking 101, Second Edition

Gitforgits 出版
2025/10/06 出版

The point of this edition is to help C++ programmers get the skills and confidence they need to do a wide range of networking tasks. The book gives lots of practical, easy-to-follow examples and covers most key areas of network programming, but intentionally leaves out highly complex scenarios.It starts with the basics of how C++ works with TCP/IP and gradually builds on that as you learn to write client-server applications, configure IP addressing and subnets, implement protocols like HTTP, FTP, SMTP, IMAP, and DNS, and handle network communication errors effectively. It's packed with clear explanations and real code that works. You'll dive into VPN setups, wireless networking standards, asynchronous programming models, and network simulations, using modern C++23 features throughout. As the chapters go on, the focus moves on to getting the most out of devices and making them run smoothly. This includes using NETCONF to automate device configurations, managing firmware updates, tweaking socket behavior for better performance, setting up recovery systems, and making diagnostic tools. You'll also set up network monitoring using Nagios, along with custom C++ checks to track faults, performance metrics, and security events in real time. After finishing, you'll be able to think and work like a network programmer and administrator, and you'll be ready to use your skills in real-world situations.Key FeaturesBuild strong foundations in TCP/IP networking using modern C++ coding examples.Work on client-server applications with TCP and UDP sockets, and get to know real-world communication patterns.Get hands-on with IP addressing, subnets, and routing through practical demonstrations and progressive programming exercises.Put core application protocols like HTTP, FTP, SMTP, IMAP, and DNS in C++.Take advantage of NETCONF and C++ to automate configuration tasks across network devices efficiently and consistently.Employ asynchronous programming, multithreading, and event-driven models to handle high-performance networking scenarios.Program your devices to automatically update their firmware, adjust their settings, and recover if something goes wrong.Combine Nagios monitoring with custom C++ checks for fault, performance, and security visibility.Simulate and test networks using NS-3 and diagnostic tools for real-time problem solving.Table of ContentIntroduction to Networking and C++Understanding TCP and UDPNetwork Interfaces and AddressingApplication Layer ProtocolsVPNsWireless NetworksAsynchronous ProgrammingNetwork Testing and SimulationNetwork Configuration ManagementNetwork Monitoring

9 特價2394
立即代訂
下次再買

Practical Purple Teaming

No Starch Press 出版
2025/09/30 出版

Real-world threats demand real-world teamwork. If you're tired of red team reports gathering dust--or defensive teams being left in the dark--this book is for you. Practical Purple Teaming gives you a hands-on blueprint for running collaborative security exercises that improve detection, build trust, and expose real gaps before attackers do. You'll learn how to emulate adversaries using tools like Atomic Red Team, MITRE Caldera, and Mythic, and you'll guide defenders toward actionable insights using real logs, alerts, and frameworks like MITRE ATT&CK, the Cyber Kill Chain, and the Pyramid of Pain. If you're running your first purple team exercise or trying to scale a repeatable program, this book will show you how to move from ad hoc simulations to a sustainable, integrated strategy. You'll learn how to: Design purple team exercises that produce measurable improvements Emulate attacks using threat intel and adversary simulation toolsCollect telemetry and analyze coverage using open source platformsAutomate labs with Splunk's Attack Range and other free resourcesBuild a sustainable, cross-functional purple teaming function within your organizationWhether you're red, blue, or somewhere in between, this book will help you test smarter, detect faster, and collaborate better. If you've ever finished a red team engagement and wondered what actually changed, this is your playbook.

9 特價2052
立即代訂
下次再買

The Propagation of Misinformation in Social Media

2025/09/25 出版

There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner disproportionate engagement. Within this clamour, fringe sources and viewpoints are mainstreaming, and mainstream media are marginalized. This book takes up the mainstreaming of the fringe and the marginalization of the mainstream. In a cross-platform analysis of Google Web Search, Facebook, YouTube, Reddit, Twitter, Instagram, 4chan and TikTok, the authors found that hyperpartisan web operators, alternative influencers and ambivalent commentators are in ascendency. The book can be read as a form of platform criticism. It puts on display the current state of information online, noting how social media platforms have taken on the mantle of accidental authorities, privileging their own on-platform performers and at the same time adjudicating between claims of what is considered acceptable discourse.

9 特價4788
貨到通知
下次再買

Practical IoT Solutions for Students Using Popular Development Platforms

Eliva Press 出版
2025/09/23 出版

Practical IoT Solutions for Students Using Popular Development Platforms: Arduino, Raspberry Pi and NodeMCU is your gateway to understanding the dynamic and rapidly evolving world of IoT. Designed for students and enthusiasts, this book provides a hands-on approach to learning, exploring practical applications of IoT using popular platforms like Arduino Uno, Raspberry Pi, and NodeMCU. This book bridges the gap between theory and practice, empowering readers to create innovative solutions for real-world problems. With step-by-step explanations, detailed projects, and simplified concepts, it introduces the fundamentals of IoT, sensor integration, cloud connectivity, and automation.

9 特價2565
立即代訂
下次再買

AHS Internet Password Logbook

2025/09/23 出版

Remembering internet passwords and usernames has never been more beautiful! Easily store this precious information all in one place with this alphabetically tabbed logbook. This handy and essential record-keeping tool from the foremost authority in North American gardening, the American Horticultural Society, is accented by historical botanical illustrations and filled with hundreds of entry templates that make it easy to track important device logins, passwords, usernames, URLs, recovery keys, and wireless network details. Gone are the days of scribbling these essential details on sticky notes that get lost or thrown away! The cut-away alphabetical tabs make the recorded information easy to find, and quick tips for creating strong passwords and keeping your information safe on the internet are also found inside. Included are places to record: 400 different websites and their usernames and passwords (with room for three password changes each) Login information and recovery keys for 6 different devices, including phones, tablets, or computersFactory-default and user-defined usernames and passwords for wireless networks A blank lined page for jotting down additional notesA removable title band and the botanical-accented cover mean others won't know that important information is housed in this pretty little book, making it as discreet as it is convenient. A perfect gift for any flower lover or for yourself! **Also in this series of giftable books from the American Horticultural Society is the AHS Weekly Planner.

9 特價445
立即代訂
下次再買

Security for Everyone

Laura,Bell  著
Holloway 出版
2025/09/19 出版

Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test your personal security assumptions and practices, which will set you up to lead security for an ever-growing team. You'll learn frameworks for understanding security at different stages of your business, and be guided on a practical journey from secure individual to security leader.Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.You'll learn: Why security matters and how it applies to our business, systems, data, and people.How to protect your own data and key accounts online (such as email and social media)-not just for your own benefit but for the safety of those you care about.How to protect your small business and the key data and tools you rely on to operate-from your website to your email-whether you are protecting yourself or working with a service provider.How to protect your startup and maximize your chance of survival as you take big risks and innovate-from vulnerability management as the technical environment team grows, to communicating security with your customers.How to scale your security for your growing organization-moving your security approach from foundations, to weaving security through your day to day operations and assessing the threats you face as your strategy changes.

9 特價1197
立即代訂
下次再買

They Lied About SEO

Vizzybrand 出版
2025/09/19 出版

They Lied About SEO is the no-fluff, real-world guide for small business owners, content creators, and entrepreneurs who are sick of being invisible online.You've probably been told that SEO is all about keywords, backlinks, and technical tricks. You've probably also been told that to get seen, you'll need to run ads, hire an agency, or learn how to "play the algorithm." But after spending time, money, and energy on things that don't work, you're still not showing up where it matters. That's not your fault.They lied to you.In this raw and revealing book, serial entrepreneur and marketing expert Eric F Gilbert exposes the truth behind the SEO industry-and why it's rigged to keep you confused and paying. He's helped hundreds of real people build real visibility without spending a fortune, writing code, or waiting months for results.This book breaks down how online visibility really works in today's AI-driven internet, and shows you how to become the authority people trust and the name they see everywhere-without needing to master tech or chase ever-changing search engine updates.You'll discover: Why traditional SEO advice fails most small business ownersHow to build digital visibility without ads, hacks, or complexityA proven strategy that leverages real conversations, expert positioning, and omnipresenceHow to dominate your niche by becoming the one people see, trust, and buy fromWhether you're just starting out or you've been spinning your wheels for years, They Lied About SEO will finally give you the clarity and strategy you need to get found-and get paid.Stop wasting time. Stop guessing. Stop feeding the machine. It's time to own your visibility.

9 特價616
立即代訂
下次再買

Security for Everyone

Laura,Bell  著
Holloway 出版
2025/09/19 出版

Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test your personal security assumptions and practices, which will set you up to lead security for an ever-growing team. You'll learn frameworks for understanding security at different stages of your business, and be guided on a practical journey from secure individual to security leader.Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.You'll learn: Why security matters and how it applies to our business, systems, data, and people.How to protect your own data and key accounts online (such as email and social media)-not just for your own benefit but for the safety of those you care about.How to protect your small business and the key data and tools you rely on to operate-from your website to your email-whether you are protecting yourself or working with a service provider.How to protect your startup and maximize your chance of survival as you take big risks and innovate-from vulnerability management as the technical environment team grows, to communicating security with your customers.How to scale your security for your growing organization-moving your security approach from foundations, to weaving security through your day to day operations and assessing the threats you face as your strategy changes.

9 特價1436
立即代訂
下次再買

Grey Area

Vinny,Troia  著
Wiley 出版
2025/09/15 出版

A compelling, first-hand account of the dark web, from its underground ecosystem, to the people responsible for committing data breaches and leaking data, 21st century's most consequential data breaches, the responses to those attacks, and the impact of dark web data and intelligence gathering and can have in the defense and security of our nation. In Grey Area, veteran hacker and cybersecurity investigations expert Vinny Troia offers an unfiltered, first-person look into the evolving relationship between open-source intelligence (OSINT) and the dark web data ecosystem. Drawing from years of hands-on experience in digital forensics, dark web investigations, and adversarial engagement, Troia explores how publicly available and commercially available information--PAI and CAI--are rapidly becoming the backbone of modern intelligence operations, and how a human intelligence network of known cyber criminals helped identify and stop one of the largest data breaches in known history. This book examines the legal, operational, and ethical dimensions of collecting and exploiting data from the darkest corners of the internet, including leaked databases, breached credentials, and hidden criminal networks. It breaks down how to discover, process, validate, and operationalize this data in real-world contexts--from attribution and threat actor profiling to national security use cases. You'll explore the evolution of OSINT within the Department of Defense and the Intelligence Community through exclusive, first-hand accounts from senior officials who helped define its path. You'll also learn how AI and automation tools are being used to validate data at scale, detect disinformation, and supercharge open-source investigations. The book also covers how data is stolen and what happens to it after the theft. Through his direct account as Reddington, Troia provides actual unedited conversations with the cyber criminals responsible for a hack targeting more than 160 companies, including his own interactions leading to the hack, the extortion negotiation and responses with each of the effected organizations, and how the hackers were ultimately brought to justice. From discussions of the legal grey areas of data collection, ransom negotiations, and a first-hand perspectives of his interaction with well-known hackers, Grey Area is a compelling and honest account of the realities of the dark web, data theft, and ways in which the intelligence community should be leveraging these methods to help strengthen our national security. Inside the book: Blow-by-blow accounts of one of the largest data breaches in recorded history Interviews and commentary from high level officials at the CIA, ODNI, DIA, and DOD. Informed, insightful commentary on how cybersecurity professionals are using dark web open-source intelligence to strengthen national security, and our country's defenses against hackers and foreign adversaries. Revealing interviews with experienced hackers who explain a variety of approaches, philosophies, and strategies for combatting and recovering from data breaches Grey Area is essential reading for cybersecurity professionals, intelligence analysts, investigators, and policy leaders navigating the complex intersection of dark web data, national security, and open-source intelligence. Through real-world case studies and insider accounts, it delivers actionable insight into the future of data-driven investigations, threat attribution, and the expanding role of OSINT in modern intelligence operations.

9 特價1710
立即代訂
下次再買

The Internet Stack

Amrit,Tiwana  著
Mit Press 出版
2025/09/15 出版

An accessible journey through the seam that connects the digital world of the Internet to our physical world. The stack--the conduit between our digital and physical worlds--is the elusive, mysterious, and least-understood part of the Internet. In the five seconds it took you to read that, 100 quadrillion bits of data just whizzed through the stack. Our metaphors--cloud, virtual, cyber--blind us to the incredible reality: The Internet is a physical thing: dingy, wet, and rusty. In The Stack, Amrit Tiwana takes us on a journey through this gritty reality. The book begins with its breathtaking physical layer, laden with geography, luck, and history dating to the Civil War era. Then it shows us how most Internet traffic flows deep undersea as laser beams, not up in the "cloud" via satellites. It goes on to explore how the stack constructs and deconstructs "packets" layer-by-layer, how these packets travel over rickety paths, and how the stack can assimilate stuff that has yet to be invented. Finally, it discusses how we construct resilience out of fragile parts and how quantum computing might affect the stack.

9 特價648
貨到通知
下次再買

Cybersecurity For Beginners

Ayhma,Awther  著
2025/09/14 出版

Gain mastery over Cybersecurity Essentials without being overwhelmed by technical jargon or prior tech experience!Are you curious about the rapidly evolving world of cybersecurity but find yourself lost in a sea of acronyms and technical vocabulary? Do you want to protect your personal information online but fear making mistakes that could compromise your security? Are you looking to break into a cybersecurity career but unsure where to begin? If you've found yourself nodding along, you're not alone. Many individuals, eager to explore technology and protect themselves in a digital world, grapple with similar concerns. However, there's no need to feel daunted. Discover how "Cybersecurity For Beginners" can empower you to navigate this exciting field with confidence and ease. Here's just a taste of what you can unveil inside this enlightening guide: The beginner-friendly guide to cybersecurity, designed specifically for those with minimal technical background.Five fundamental principles of cybersecurity you need to know to safeguard your digital life.A complete mapping of common cyber threats like phishing, malware, and ransomware-and how to shield yourself against them.How to fortify your passwords without creating cumbersome combinations you'll forget.Explore various career paths in cybersecurity with insights from diverse roles like SOC analyst and penetration tester.Step-by-step instructions on setting up a VPN and using two-factor authentication for enhanced protection.Learn the practical application of cybersecurity measures through real-world case studies.Eight game-changing security habits that elevate your personal safety in the digital realm.The importance of the CIA triad and its role as the cornerstone of all cybersecurity practices.How current trends and technologies impact cybersecurity and what you must watch out for.Tips for avoiding common cybersecurity pitfalls to protect your home network without worry....and much more! Think you need to be a tech expert to understand this book? Think again! This guide is crafted with clarity and real-world practicality at its core, using accessible language with visual aids to make complex ideas relatable and easy to grasp. In this rapidly evolving digital age, keeping up with cybersecurity shouldn't be a daunting task but an empowering journey. Whether you're starting from scratch or looking to refine your skills, this book provides a comprehensive, up-to-date resource tailored for beginners. Embrace this opportunity to get ahead in cybersecurity and safeguard your digital future with confidence. Scroll up and click "Add to Cart" to begin your journey now! See you on the inside.

9 特價752
立即代訂
下次再買

AI and ADA

2025/09/10 出版

This volume first explores the potential of machine translation of literature; goes on to explore possibilities for artificial literary creation; and finishes by assessing recent spectacular progress in generative artificial intelligence (AI) - throughout, with reference to Vladimir Nabokov's hyperconscious literary art.

9 特價853
立即代訂
下次再買

AI and ADA

2025/09/10 出版

This volume first explores the potential of machine translation of literature; goes on to explore possibilities for artificial literary creation; and finishes by assessing recent spectacular progress in generative artificial intelligence (AI) - throughout, with reference to Vladimir Nabokov's hyperconscious literary art.

9 特價3762
立即代訂
下次再買

Cybersecurity Mistakes for SMBs to avoid

Acrasolution 出版
2025/09/08 出版

Cybersecurity Mistakes to Avoid: How to Protect Your Small Business from Costly ThreatsMost businesses aren't hacked by elite cybercriminals working in secret government labs. They're breached by avoidable mistakes-a missed update, a weak password, a careless click on a phishing link. And while the headlines focus on billion-dollar companies, small and mid-sized businesses (SMBs) are the real targets.In Cybersecurity Mistakes to Avoid, Eric LeBouthillier exposes the 15 most dangerous security errors threatening SMBs today-and shows you exactly how to fix them before they cost you everything.This isn't theory. It's battle-tested insight from real-world incidents-written in plain English, stripped of jargon, and designed for business owners, startup founders, IT leads, and anyone responsible for protecting digital assets on a budget.✅ Inside you'll discover: Why "too small to be a target" is a deadly myth-and why SMBs are prime targets for ransomware, phishing, and credential stuffing.The password problem most teams ignore-and how to fix it with password managers, unique logins, and multi-factor authentication.Phishing traps that still work in 2025-how modern attackers trick even savvy employees, and how to train your team to spot the bait.The risks of remote work and BYOD-and the practical steps to secure home offices, VPNs, and personal devices without killing productivity.The hidden cost of skipping updates and patches-and how automated patching can close doors attackers exploit daily.Cloud and AI security blind spots-why your provider doesn't secure everything, and how careless AI usage can leak sensitive data.Backup and recovery mistakes-why untested backups fail when you need them most, and the 3-2-1 rule every SMB must know.Compliance and incident response-how to get ahead of SOC 2, GDPR, HIPAA, and why having a tested response plan can save your company.✅ Real-World Case StudiesEvery chapter includes real-world breaches from small firms-architecture firms paying $28,000 in ransom, marketing agencies losing $40,000 to reused passwords, startups exposing customer data in cloud misconfigurations, and more. You'll see what went wrong, what it cost, and how it could have been avoided with simple, affordable measures.✅ Who This Book Is ForSmall business owners & solopreneurs who need practical protection without hiring a full-time security team.Startup founders & consultants managing sensitive client data and customer trust.IT managers & developers trying to secure systems while staying lean.

9 特價648
立即代訂
下次再買

The $10 Million Instagram Funnel

Brian,Mark  著
2025/09/08 出版

Brian Mark shares the proven strategies used to grow a thriving online coaching company without paid ads, complicated funnels, or a website. This book is a step-by-step guide for business owners looking to attract high-paying clients, generate consistent leads, and scale using organic social media. Brian breaks down how to build a standout personal brand, create content that converts, and implement a simple system for lead generation and sales. Whether you're just starting out or ready to grow, this book gives you the blueprint to build a six-figure business with ease.

9 特價684
立即代訂
下次再買

The $10 Million Instagram Funnel

Brian,Mark  著
2025/09/08 出版

In $10 Million Instagram Funnel, Brian Mark shares the proven strategies he used to grow a thriving online fitness business without paid ads, complicated funnels, or a website. This book is a step-by-step guide for fitness professionals looking to attract high-paying clients, generate consistent leads, and scale using organic social media. Brian breaks down how to build a standout personal brand, create content that converts, and implement a simple system for lead generation and sales. Whether you're just starting or ready to grow, this book gives you the blueprint to build a six-figure fitness business with ease.

9 特價1026
立即代訂
下次再買

The Podcast Pantheon

Sean,Malin  著
Chronicle Books 出版
2025/09/03 出版

Spanning the most popular podcast genres--true crime, comedy, sports, relationships, and more--culture critic and Vulture's Start Here columnist Sean Malin introduces the first comprehensive canon in podcast history. Featuring a foreword by award-winning actor and producer Jon Hamm. The Golden Age of podcasts is upon us. With over fifty official podcast networks, more than three million programs of every imaginable category available for download, and tens of millions of unique listens and views every week in the US alone--plus, our favorites being adapted into dozens of beloved films, TV series, and books--podcasts are now part of the fabric that makes up our everyday global media. Finally, here is an exclusive insider's perspective told through 101 different shows across dozens of genres. The Podcast Pantheon is the first book of its kind: A resource for discovering podcasts and learning more about how this multibillion-dollar industry came into being from the geniuses who created it. Delving into genres of all kinds--including fashion, food, health, sex, tech, and more--Malin profiles all the top podcasts, from Serial to Comedy Bang! Bang!, guiding fans to: Find out more about their favorite shows and how they got started. Learn about each podcast's influences and impact on culture, history, future shows, and the industry at large. Hear exclusive stories and enjoy never-before-seen behind-the-scenes photos from favorite hosts. Discover hidden gems, whether an entirely new podcast, a new-to-you genre, or something reminiscent of an old favorite. Readers will find podcasts worth listening to and get expert advice on the best episodes to start with, solving one of the biggest and most intimidating hurdles when trying to dive into a longstanding show. Malin's easy-to-read profiling and titillating exploration of 101 podcasts offers something for everybody, whether you've been listening to podcasts for years, are new to them, or are looking to start your own. EXPERT KNOWLEDGE: A culture critic since 2007 and the writer behind Vulture's hit podcasting column Start Here, Sean Malin has interviewed and connected with the world's top podcasters, including Marc Maron, Conan O'Brien, Nicole Byer, Ira Glass, and Jenna Fischer and Angela Kinsey, among many others, and has the inside scoop on the most popular and award-winning podcasts. A MUST-HAVE LISTENER'S COMPANION: Dip in and out of this enticing guide that's perfect for beginners and serious listeners alike. Profiled podcasts include: WTF with Marc Maron My Favorite Murder Conan O'Brien Needs a Friend Office Ladies Why Won't You Date Me? The Accessible Stall Stuff You Should Know Wait, Wait . . . Don't Tell Me! How Did This Get Made? Fresh Air The Moth S-Town Hollywood Handbook Doughboys Bad with Money Welcome to Night Vale And many more! FAN FAVORITES AND NEW DISCOVERIES: Sean Malin reveals fascinating information about 100+ shows and their talented hosts, tells you where to listen, and offers his favorite episode pick for each. His wide-ranging and comprehensive overview gives ample opportunity to discover something new to dive right into. Perfect for: Podcast enthusiasts and new listeners Those in search of new podcasts to devour Podcast creators and anyone interested in starting their own podcast Foodies, artists, entrepreneurs, fashionistas, parents, teachers, fitness enthusiasts, newshounds, and many more Gift-giving to podcast junkies and pop culture fans Media professionals, scholars, educators, historians, and consumers

9 特價853
立即代訂
下次再買

Computer Safety, Reliability, and Security

Springer 出版
2025/08/23 出版

This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025. The 15 full papers included in these proceedings were carefully reviewed and selected from 79 submissions. They were organized in topical sections as follows: Safety Arguments/Cases; Data Sets and Dependability Properties; Testing and Complex Environments; Methodologies (1) - Safety Design and Risk Assessment; and Methodologies (2) Machine Learning and Large Language.

9 特價3577
立即代訂
下次再買

Computer Safety, Reliability, and Security. Safecomp 2025 Workshops

Springer 出版
2025/08/23 出版

This book constitutes the proceedings of the Workshops held in conjunction with the 44th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2025, which took place in Stockholm, Sweden, during September 2025. The 43 papers included in this book were carefully reviewed and selected from a total of 61 submissions to the following six workshops: - CoC3CPS 2025, Co-Design of Communication, Computing and Control in Cyber-Physical Systems - DECSoS 2025 - 20th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems - SASSUR 2025 - 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems - SENSEI 2025 - 4th International Workshop on Safety and Security Interaction - SRToITS 2025 - 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems - WAISE 2025 - 8th International Workshop on Artificial Intelligence Safety Engineering

9 特價3815
立即代訂
下次再買

The Social Media Trap - How to Protect Your Mental Health in a Digital World

Emma,Parker  著
2025/08/21 出版

Social media was designed to connect us-but for many, it's doing the opposite. Anxiety, comparison, loneliness, and burnout are becoming the hidden costs of a life lived online.The Social Media Trap - How to Protect Your Mental Health in a Digital World is a wake-up call and a guidebook for anyone feeling overwhelmed by the endless scroll. Backed by psychology, neuroscience, and real-world stories, this book reveals how digital platforms are engineered to hijack your attention, exploit your emotions, and subtly shape your self-worth-and more importantly, how to break free.This isn't about quitting the internet. It's about reclaiming your time, focus, and emotional well-being in a hyperconnected world.Inside, you'll learn: How social media affects the brain-especially dopamine, attention, and moodThe links between screen time, anxiety, depression, and self-esteemThe role of algorithms in creating addiction, polarization, and FOMOPractical strategies to set digital boundaries and reduce online stressHow to curate a healthier online environment without disconnecting completelyTools for developing digital resilience, self-awareness, and mindful tech habitsWhether you're a parent, teen, professional, or everyday user, The Social Media Trap offers clarity in a confusing landscape. It empowers you to take control of your digital experience-and protect your mental health without giving up the benefits of modern connection.Because your mind is too valuable to be managed by an algorithm.

9 特價221
立即代訂
下次再買

Dark Web Reality

2025/08/20 出版

Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret marketplaces to encrypted communication hubs, the dark web has captured public imagination as a place of danger, secrecy, and forbidden activity. But the truth is far more complex. In Dark Web Reality, you'll journey through the internet's hidden layers-uncovering the facts, the myths, and the double-edged nature of anonymity in the digital age.Inside, you'll discover: The three layers of the internet - surface, deep, and dark web - and how they interact.The rise of Tor and onion routing, and why anonymity can be both a shield for freedom and a cloak for crime.Digital black markets, from the infamous Silk Road to modern underground economies.The light within the darkness - whistleblowing platforms, human rights tools, and lifesaving uses of hidden networks.Law enforcement in the shadows, battling cybercrime while protecting online freedoms.How to stay safe online, avoid scams, and understand the ethical boundaries of hidden internet use.Written with investigative depth and clear explanations, Dark Web Reality pulls back the digital curtain to reveal what truly happens beyond the reach of Google. Whether you're a cybersecurity enthusiast, a concerned citizen, or simply curious about what lies beneath the surface, this book will equip you with the knowledge to navigate - and understand - the hidden world of the internet.Enter at your own risk - and with open eyes.

9 特價846
立即代訂
下次再買

Year One Cybersecurity

Self-Publish 出版
2025/08/20 出版

Embark on your exciting cybersecurity career with confidence using Year One Cybersecurity: Foundational Overview. This clearly structured guide empowers aspiring professionals with essential knowledge, practical skills, and the right mindset to excel in a rapidly evolving field. Packed with real-world scenarios and clear explanations, it bridges the gap between theory and practice so you can hit the ground running in your first year.Inside this comprehensive guide, you will: - Master core security principles and frameworks, building a rock-solid foundation from day one.- Gain hands-on experience through practical exercises and labs that mirror real-world scenarios.- Learn to use industry-standard tools and best practices, from network defense to incident response.- Develop communication skills to articulate threats and solutions to both technical and non-technical audiences. - Get insider tips to navigate your first year in the field with confidence and professionalism.Whether you're launching your cybersecurity career or reinforcing the basics, Year One Cybersecurity will become your go-to reference for years to come. It provides the knowledge, skills, and confidence you need to survive and thrive in the exciting world of cybersecurity!

9 特價1026
立即代訂
下次再買
頁數1/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing