-
Go Programming Cookbook
Ingram 出版The Go Programming Cookbook ensures Go programmers may confidently and effectively navigate the com
-
Progress in Cryptology - Indocrypt 2023
Springer 出版The two-volume proceedings constitutes the refereed proceedings of the 24th International Conferenc
-
AI Powered Data Privacy & Data Protection For Small Businesses
Ingram 出版AI-powered Data Compliance for Small Businesses is an essential guide for entrepreneurs and small b
-
-
The Podcasting Blueprint
Ingram 出版Your Ultimate Guide to Crafting, Growing, and Profiting from a Captivating Podcast. Have you ever l
-
Zero Trust Security Demystified
Ingram 出版Gain cybersecurity confidence - unlock the secrets to a foolproof defense system for your digital a
-
The Podcasting Blueprint
Ingram 出版Your Ultimate Guide to Crafting, Growing, and Profiting from a Captivating Podcast. Have you ever l
-
Rogan's World
Lulu.com 出版This book discusses the origins of internet in the context of globalization, the emergence of World
-
Zero Trust Security Demystified
Ingram 出版Gain cybersecurity confidence - unlock the secrets to a foolproof defense system for your digital a
-
Ultimate Nuxt.js for Full-Stack Web Applications
Ingram 出版Build slim SSR and SSG Nuxt applications with Composition API, remote Node.js applications, and PHP
-
111 Prompts for ChatGPT, Microsoft Copilot and Other Chatbots for Business Leadership
Ingram 出版Visualize your team's productivity soaring, KPIs shattering ceilings, and your organizational growt
-
-
Ready. Set. Game!
Lulu.com 出版Do you have a gaming device? Do you talk to unknown people through your gaming device without your
-
Pen Testing from Contract to Report
Wiley 出版Protect your system or web application with this accessible guide Penetration tests, also known as
-
Ready. Set. Game!
Lulu.com 出版Do you have a gaming device? Do you talk to unknown people through your gaming device without your
-
-
Advanced Python Scripting for ArcGIS Pro
Esri Press 出版Tackle complex spatial data tasks effortlessly with this easy-to-follow guide to writing specialize
-
Media Technology in Education
This volume offers rare perspectives examining the influence of media technology on learning patter
-
The Rise of the Algorithms
The meteoric rise of online video is reshaping the competition for human attention. The Rise of the
-
Cybersecurity Study Guide
In a world where our digital lives are under constant threat, your security matters more than ever
-
Applied Cryptography and Network Security
Springer 出版The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference
-
Technical Innovation, Solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy
Ingram 出版In the third i3-MARKET series book we focus on the best practices and simplest software methods and
-
Angular for Enterprise Applications - Third Edition
Harness the full power of Angular 17 with up-to-date tools and enterprise-level best practicesPurch
-
Ace the Data Science Interview
Ace the Data Science Interview: Unveil The Secrets of 100 Questions from the World's Leading Tech G
-
Cloud Forensics Demystified
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining trad
-
Concepts and Design Innovations Addressing the Digital Transformation of Data Spaces and Marketplaces
Ingram 出版In the first part of the i3-MARKET Book series we begin by discussing the principles of the modern
-
Systems and Implemented Technologies for Data-Driven Innovation, Addressing Data Spaces and Marketplaces Semantic Interoperability Needs
Ingram 出版In the second i3-MARKET series book we review the basic technological principles, software best pra
-
Security Without Obscurity
Ingram 出版Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptograp
-
Cybersecurity Risks and Controls
Ingram 出版In an era where digital threats loom large, this comprehensive book provides a holistic exploration
-
Trojan Exposed
Ingram 出版Introducing the "Trojan Exposed" Book Bundle: Your Ultimate Defense Against Cyber Threats!�&
-
Analysis and Visualization of Discrete Data Using Neural Networks
Ingram 出版This book serves as a comprehensive step-by-step guide on data analysis and statistical analysis. I
-
Cybersecurity Risks and Controls
Ingram 出版In an era where digital threats loom large, this comprehensive book provides a holistic exploration
-
-
Information Security and Cryptology
Springer 出版The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th Internatio
-
Applied Cryptography and Network Security
Springer 出版The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference
-
Applied Cryptography and Network Security
Springer 出版The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference
-
NMAP Network Scanning Series
Ingram 出版Unlock the Power of Network Security with the NMAP Network Scanning Series!Welcome to the Network S
-
Wireless Exploits And Countermeasures
Ingram 出版���� Wireless Exploits and Countermeasures Book Bundle ��
-
Information Security and Cryptology
Springer 出版The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th Internatio
-
In Zero Trust We Trust
Cisco Press 出版Before an enterprise answers "How can we achieve a Zero Trust architecture?" they should be asking
-
Apprentices of Wonder
BANTAM 出版"If you want to understand the latest scientific thinking about the relations between mind and brai
-
Beyond The Apes & Vapes of Web3
Ingram 出版Dive deep into the exhilarating world of Web3 with me. Together, we'll traverse my successes, learn
-
The Shifting Landscape of Tech Careers
In this opening chapter, readers are introduced to the rapidly evolving world of technology and its
-
Internet of Things from Scratch
Packt 出版Kickstart your IoT design and implementation journey with this comprehensive book, covering basics
-
Psychological Effects of Internet Trolling
Blurb 出版In the age of the internet, a peculiar and often destructive phenomenon has emerged - internet trol
-
Ethical Hacking and Network Analysis with Wireshark
Ingram 出版Wireshark: A hacker's guide to network insightsDESCRIPTION Ethical Hacking and Network Anal
-
-
Machine Learning Infrastructure and Best Practices for Software Engineers
Packt 出版Efficiently transform your initial designs into big systems by learning the foundations of infrastr