-
Hands-On Python Deep Learning for the Web
Packt 出版Use the power of deep learning with Python to build and deploy intelligent web applicationsKey Feat
-
UnhackableYour Online Security Playbook: Recreating Cyber Security in an Unsecure World
Ingram 出版Terrified about identity theft and data breaches? Discover a foolproof method to protect your infor
-
Podcast Planner
Ingram 出版If you're looking for a simple way to plan your podcast, then keep reading...Podcasting offers the
-
Podcast Planner
Ingram 出版If you're looking for a simple way to plan your podcast, then keep reading...Podcasting offers the
-
Podcasting - The little Book of Podcasting
Ingram 出版Do you want to share your message or passion with an eager audience?Are you interested in taking ad
-
AI Self-Driving Cars AccordancePractical Advances In Artificial Intelligence And Machine L
Ingram 出版A vital book by industry thought leader and global AI expert, Dr. Lance Eliot, and based on his pop
-
Data and Applications Security and Privacy XXXIV
Springer 出版This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data a
-
A Simple Start to Jquery, Javascript, and Html5 for BeginnersASimple Start to Jquery, Java
Ingram 出版Are you looking for a quickest and easiest way to learn jQuery, JavaScript, and HTML5?Inside this c
-
Hands-On Web Penetration Testing with Metasploit
Packt 出版Identify, exploit, and test web application security with easeKey Features Get up to speed with Me
-
Stiennon On Security
Ingram 出版Stiennon on Security is a collection of over 100 essays written by Richard Stiennon between 2010 an
-
Supercomputing Frontiers
Springer 出版Session I - File Systems, Storage and Communication.- A BeeGFS-based Caching File System for Data-i
-
Penetration Testing for Dummies
For Dummies 出版Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is neces
-
Cybersecurity Is Everybody's Business
Ingram 出版Since publication of his first book, Hacked Again, Scott Schober has dedicated himself to educating
-
Metasploit 5.0 for Beginners - Second Edition
Packt 出版A comprehensive guide to Metasploit for beginners that will help you get started with the latest Me
-
Full-Stack React Projects - Second EditionLearn MERN stack development by building modern
Packt 出版A practical, project-based guide to full-stack JavaScript web development combining the power of Re
-
-
Linux Administration: A Beginner’s Guide, Eighth Edition
McGraw-Hill 出版Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher f
-
El ?xito de MLM En TwitterEl?xito de MLM En TwitterLa M獺quina Secreta de la Genearci籀n - E
Ingram 出版El ?xito de MLM En Twitter La M獺quina Secreta de la Genearci籀n - Estrategia de Medios Sociales Prob
-
Digitale Sichtbarkeit durch Instagram
Ingram 出版Hier erh瓣ltst du eine Zusammenfassung f羹r die optimale Sichtbarkeit durch Instagram. Viele erfolgse
-
El ?xito de MLM En FacebookEl?xito de MLM En FacebookConstruir Una L穩nea Descendente Fuert
Ingram 出版Multi-nivel de Marketing golpe籀 el mundo de los negocios hace mucho tiempo, con lo que su enfoque 繳
-
Wireless personal area networking technologies for low-power Smart-Home applications
Ingram 出版Bachelor Thesis from the year 2015 in the subject Computer Science - Internet, New Technologies, gr
-
Building React Apps with Server-Side Rendering
Apress 出版Leverage the benefits of both client-side and server-side rendering to get the most out of your Rea
-
Introducing the Html5 Web Speech API
Apress 出版Leverage the power of HTML5 Web Speech API to quickly add voice capabilities to your websites. This
-
Learn Azure Sentinel
Packt 出版Understand how to set up, configure, and use Azure Sentinel to provide security incident and event
-
Secure Yourself
Ingram 出版Cybersecurity can be intimidating for anyone who lives in this connected world and is not a securit
-
Zoom Meetings
Ingram 出版Whether you are looking to use Zoom to attend a work meeting, deliver a presentation online, lead a
-
A Hacker I Am Vol 2
Ingram 出版This book is the second book in the "A Hacker, I Am" series, it is not your normal cybersecurity bo
-
MSWiM’19Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Sim
Ingram 出版Welcome to the 22nd ACM International Conference on Modelling, Analysis, and Simulation of Wireless
-
Microcontroller and Smart Home Networks
Ingram 出版Over recent years industries have faced the problem of how to connect devices to 'speak' to each ot
-
Serial Communication Protocols and Standards
Ingram 出版Data communication standards are comprised of two components: The "protocol" and "Signal/data/port
-
Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Ingram 出版Build secure private blockchain networks to handle mission-critical security challenges such as den
-
Foundations and Practice of Security
Springer 出版This book constitutes the revised selected papers of the 12th International Symposium on Foundation
-
Derivation of Newton’s Law of Gravitation
Ingram 出版In Newton's view, all objects exert a force that attracts other objects. That universal law of grav
-
-
Developing a Cybersecurity Immune System for Industry 4.0
Ingram 出版Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its c
-
-
Datenschutz - Wer hat den schwarzen Peter?
Ingram 出版Der Umgang mit den Aufgaben des Datenschutzes erinnert in vielen Organisationen h瓣ufig an das Kunde
-
Information Management and Big Data
Springer 出版This book constitutes the refereed proceedings of the 6th International Conference on Information M
-
LinkedIn for MilitaryYour Interactive Transition Networking Guide
Ingram 出版The third version of LinkedIn for Military will help military personnel transitioning to new civili
-
Uso del marketing viral y el uso compartido viral con bajo presupuestoGana nuevos c穩rculos
Ingram 出版El marketing viral es uno de los m矇todos m獺s exigentes de marketing. Se puede implementar con una v
-
IBM I Security Administration and Compliance
Ingram 出版In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides reader
-
-
You Can Stop Stupid
Ingram 出版Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations bi
-
Hands on Hacking
Ingram 出版A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to s
-
Coexisting problems for wireless sensor networks working in 2.4 GHz frequency band
Ingram 出版Document from the year 2019 in the subject Computer Science - Internet, New Technologies, course: W
-
The Useful Book of Gadgets, Gizmos & Apps
Ingram 出版Does it sometimes seem that everyone else is doing 'smarter' things on their smartphones than you?
-
Cybersecurity
Ingram 出版This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybe
-
Codaspy’19
Ingram 出版It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Appl