-
JavaScript Absolute Beginners Guide
Ingram 出版Make the most of today's JavaScript--even if you've never programmed anything before. JavaScript Ab
-
What to Do When You Get Hacked
Ingram 出版What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century tea
-
Practical WebAssembly
Packt 出版Understand the basic building blocks of WebAssembly and learn, install, and use various tools from
-
Cissp
John Kembrey 出版The book includes additional information on difficult topics as the beginners should have a proper
-
What to Do When You Get Hacked
Ingram 出版This book teaches you everything that you need to know about preparing your company for a potential
-
A Dismantle Approach of Likes, Retweets and Forwards
A Dismantle Approach of Likes, Retweets, and Forwards by Bhavya Jain is a representation of the dar
-
The Foundations of Threat Hunting
Packt 出版Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversa
-
China and Middle East Conflicts
Routledge 出版How do aspiring and established rising global powers respond to conflict? Using China, the book stu
-
Operationalizing Threat Intelligence
Packt 出版Learn cyber threat intelligence fundamentals to implement and operationalize an organizational inte
-
Computer & Internet Security
Ingram 出版Teaching computer and network security principles via hands-on activities Unique among computer sec
-
Internet Security
Ingram 出版Teaching Internet security principles via hands-on activities Unique among computer security texts,
-
Computer Security
Ingram 出版Teaching computer security principles via hands-on activities Unique among computer security texts
-
What The Heck Is My Password ?!
Lulu.com 出版✅ This Is The One Book You Need To Keep Safe Online - Space For Over 530 Entries If You Are T
-
An Interdisciplinary Approach to Modern Network Security
Ingram 出版An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and tren
-
5G Multimedia Communication
Ingram 出版In bringing to the readers the book 5G Multimedia Communication: Technology, Multiservices and Depl
-
-
Wireless Hacking With Kali Linux
Ingram 出版Do you like working using a wireless network since you can carry your computer and work with you ev
-
Network Science
Wiley 出版Network Science Network Science offers comprehensive insight on network analysis and network opti
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
Packt 出版Understand the fundamentals of security, compliance, and identity solutions across Microsoft Azure,
-
Cyberdefense
There is a threat lurking behind every online interaction that was first recognized nearly three de
-
Cybersecurity Myths and Misconceptions
Addison-Wesl 出版175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Elected int
-
Candlestick Charts
Ingram 出版The aim of this book is to introduce candlestick analysis to anyone from an absolute beginner to an
-
-
Privacy Preservation in Iot: Machine Learning Approaches
Springer 出版This book aims to sort out the clear logic of the development of machine learning-driven privacy pr
-
React Projects - Second Edition
Packt 出版Learn how to develop real-world applications of varying complexity for the web, mobile, and VR devi
-
Enterprise React Development with UmiJS
Packt 出版Get to grips with UmiJS and build professional web applications with the help of step-by-step expla
-
Working with the Web Audio API
Ingram 出版Working with the Web Audio API is the definitive and instructive guide to understanding and using t
-
Cybersecurity
Ingram 出版Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber arc
-
Python for ArcGIS Pro
Packt 出版Extend your ArcGIS expertise by unlocking the world of Python programming. A fully hands-on guide t
-
Microsoft Azure Ai: A Beginner's Guide
Ingram 出版Explore Azure AI Platform.Key FeaturesEasy-to-follow tutorial for getting started with the Azure AI
-
Zeroing Neural Networks
Ingram 出版Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN method
-
CYBERSECURITY and HACKING for Beginners
Ingram 出版Have you ever wondered why your computer or smartphone was attacked by a virus?Do you want to learn
-
Holistic Approach to Quantum Cryptography in Cyber Security
Ingram 出版The text covers concepts of cyber security through quantum computing and quantum cryptography in a
-
XML Programming
Apress 出版XML Web services are the fundamental building blocks in the move to distributed computing on the In
-
Fireworks MX 2004 Zero to Hero
Apress 出版Macromedia's Fireworks MX 2004 enables you to design, optimize, and add basic interactivity to your
-
Contribute
Apress 出版Macromedia's Contribute allows Web Professionals to save the time spent performing content updates,
-
Dreamweaver MX Design Projects
Apress 出版We gave four web professionals a design brief: we asked them each to plan, design, and implement a
-
Business Recovery and Continuity in a Mega Disaster
Ingram 出版The COVID-19 Pandemic has changed the entire world to levels that were not even thought of before.
-
Business Recovery and Continuity in a Mega Disaster
Ingram 出版The COVID-19 Pandemic has changed the entire world to levels that were not even thought of before.
-
Mobile App Reverse Engineering
Packt 出版Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobil
-
Preventing Harmful Behaviour in Online Communities
Routledge 出版Preventing Harmful Behaviour in Online Communities explores the ethics and logistics of censoring p
-
Security Issues for Wireless Sensor Networks
Ingram 出版Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wirel
-
Future Network Architectures and Core Technologies
Ingram 出版This book introduces the background, basic concepts and evolution of computer network development;
-
-
The Internet
Ingram 出版Want to learn about the Internet but not sure where to start? This accessible guide offers a crash
-
Kafka Streams in Action, Second Edition
Ingram 出版Everything you need to implement stream processing on Apache Kafka using Kafka Streams and the kqsI
-
Don't Force It, Solve It!
Ingram 出版"Knowing various frameworks and methodologies is crucial.... This book takes you one step further b
-
Security and Artificial Intelligence
Springer 出版AI has become an emerging technology to assess security and privacy, with many challenges and poten