-
Because You Can
Ingram 出版As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most
-
REST Assured
Lulu.com 出版Everything you need to know about creating REST API's to get real work done. No gatekeeping. No jar
-
Pro PHP 8 MVC
Apress 出版Examine the building blocks that make any good MVC framework using PHP 8. This book exposes all the
-
Python Ethical Hacking from Scratch
Packt 出版Explore the world of practical ethical hacking by developing custom network scanning and remote acc
-
Designing Professional Websites with Odoo Website Builder
Packt 出版A practical guide to crafting elegant, intuitive, and customer-friendly websites to deliver a high-
-
Icle Publications Plc-Powered Data Teams: A Guide to Effective Collaborationand Learning
Ingram 出版A practical guide to team collaboration and learning that improves student results. Why is it crit
-
Web development
Ingram 出版This book includes 3 books: - Web development for Beginners in HTML- Web design with CSS- Javascrip
-
RAND’s Scalable Warning and Resilience Model (SWARM)
Ingram 出版The model introduced in this report is intended to enhance the predictive capabilities available to
-
Malware Analysis Techniques
Packt 出版Analyze malicious samples, write reports, and use industry-standard methodologies to confidently tr
-
Jude’s Almost Daily Blog
Ingram 出版Jude Stringfellow began writing her online blog, Jude's Almost Daily Blog, in 2007, and since then,
-
All That You Need to Know About Tumblr Blogs
Ingram 出版Tumblr is one of the best blogging platforms. you can use tumblr for creating portfolios, blogging,
-
Jude’s Almost Daily Blog
Ingram 出版Jude Stringfellow began writing her online blog, Jude's Almost Daily Blog, in 2007, and since then,
-
Artificial Intelligence in Medicine
Springer 出版This book constitutes the refereed proceedings of the 19th International Conference on Artificial I
-
97 Things Every UX Practitioner Should Know
Ingram 出版Tap into the wisdom of experts to learn what every UX practitioner needs to know. With 97 short and
-
Generative AI with Python and TensorFlow 2
Packt 出版Fun and exciting projects to learn what artificial minds can create Key Features: Code examples are
-
Recent Trends in Blockchain for Information Systems Security and Privacy
Ingram 出版Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm
-
Social Media Marketing and Facebook Marketing
Ingram 出版If you want to turn your business or personal brand Facebook page into a money making machine, then
-
Practical Smoothing
Ingram 出版This is a practical guide to P-splines, a simple, flexible and powerful tool for smoothing. P-splin
-
Make Money Blogging
Ingram 出版The sad truth is that the traditional means of working - whereby the average person would work for
-
Make Money Blogging
Ingram 出版The sad truth is that the traditional means of working - whereby the average person would work for
-
SEO Made Easy
Ingram 出版Many businesses struggle to stand out from competition as they don't know how to optimize their web
-
Make Money On YouTube
Ingram 出版Do you want to make money on YouTube?When someone makes this decision to finally take control of th
-
Make Money On YouTube
Ingram 出版Do you want to make money on YouTube?When someone makes this decision to finally take control of th
-
Google Apps Made Easy
Ingram 出版**UPDATED FOR 2024** With everything being online these days it only makes sense that we are starti
-
Holistic Website Planning
Ingram 出版Relaunching websites every couple of years is costly, disruptive and unsustainable. Holistic websit
-
Digital Democracy - It for Change
Springer 出版This book constitutes the refereed proceedings of the 53rd Annual Convention of the Computer Societ
-
Kali Linux Penetration Testing Bible
Wiley 出版Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution
-
Trust in Computer Systems and the Cloud
Wiley 出版Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecu
-
Book of Anonymity
Ingram 出版Anonymity is highly contested, marking the limits of civil liberties and legality. Digital technolo
-
Network Architecture with Recursive Addressing
Ingram 出版A network architecture, named NARA, based on recursive addressing is proposed. The Internet is mode
-
Applied Natural Language Processing in the Enterprise
Ingram 出版NLP has exploded in popularity over the last few years. But while Google, Facebook, OpenAI, and oth
-
Modern Cryptography for Cybersecurity Professionals
Packt 出版As a cybersecurity professional, discover how to implement cryptographic techniques to help your or
-
Topics in Cryptology - Ct-Rsa 2021
Springer 出版This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2
-
Video Marketing Rules
Ingram 出版Video Marketing Rules shows entrepreneurs and business owners how to take advantage of the Online V
-
The Subcritical Brain
Ingram 出版Have over a hundred years of brain research revealed all its secrets? This book is motivated by a r
-
Jumpstart Jamstack Development
Packt 出版Leverage Jamstack principles, techniques, and best practices to build dynamic websites and web apps
-
Instagram Marketing Step-By-Step
Ingram 出版Are you looking to grow your branding through social media powerhouses like Instagram? Would you li
-
Mathematical Modeling and Supercomputer Technologies
Springer 出版This book constitutes selected and revised papers from the 20th International Conference on Mathema
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of
-
Public-Key Cryptography - Pkc 2021
Springer 出版The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR In
-
Advances in Artificial Intelligence and Security
Springer 出版The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th
-
Zscaler Cloud Security Essentials
Packt 出版Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provid
-
Cisco Certified CyberOps Associate 200-201 Certification Guide
Packt 出版Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associa
-
Applied Cryptography and Network Security
Springer 出版The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Confere
-
Technological Innovation for Applied AI Systems
Springer 出版This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Deep Learning and Linguistic Representation
Ingram 出版The application of deep learning methods to problems in natural language processing has generated s
-
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Springer 出版There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first compo
-
Silicon Valley Cybersecurity Conference
Springer 出版This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Confe