-
Internet and Web Application Security
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mob
-
Ethical Hacking: Techniques, Tools, and Countermeasures
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategie
-
Secret Key Cryptography
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical met
-
Linux Fundamentals
The Linux world is constantly changing, requiring new knowledge and skills to work as a Linux syste
-
Networks Rising
Ingram 出版For the second time in human history, we are on the verge of broad new breakthroughs in health, pro
-
Cybersecurity Essentials
About the BookIf you need to read only one book to acquire a strong foundation in cybersecurity fun
-
Briefs Anthology Volume 3
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 1
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Security Engineering for Embedded and Cyber-Physical Systems
Ingram 出版Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at
-
Exploration of Novel Intelligent Optimization Algorithms
Springer 出版This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, hel
-
Assured Autonomy Survey
Autonomous systems will soon be ubiquitous in our society, saving us time, performing tasks we do n
-
Web Search Engines With Particular Reference
There are many search engines that facilitate information retrieval from the World Wide Web. Howeve
-
If It’s Smart, It’s Vulnerable
Wiley 出版Reimagine the future of the internet All our devices and gadgets--from our refrigerators to our hom
-
Executive’s Guide to Cyber Risk
Wiley 出版A solid, non-technical foundation to help executives and board members understand cyber risk In the
-
Two-Factor Authentication
Ingram 出版Passwords are not enough A password is a single authentication factor - anyone who has it can use i
-
Fundamentals of Information Systems Security with Navigate Testprep
Navigate TestPrep for Fundamentals of Information Systems Security, Fourth Edition is a digital-onl
-
Navigate Testprep for Fundamentals of Information Systems Security with Cloud Labs
Navigate TestPrep for Fundamentals of Information Systems Security, Fourth Edition is a digital-onl
-
It Induction and Information Security Awareness
Ingram 出版Where your information security is concerned, prevention is better than cure. If you want to tackle
-
The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks
Ingram 出版In the world as we know it, you can be attacked both physically and virtually. For today's organisa
-
-
Security Awareness: Applying Practical Cybersecurity in Your World
Cengage 出版Designed to provide you with the knowledge and skills needed to protect your technology devices fro
-
The Internet of Things
As more and more devices become interconnected through the Internet of Things (IoT), there is an ev
-
OSPF Demystified With RFC
Lulu.com 出版OSPF Routing Protocol is the most used protocol in the world, especially in the world of service pr
-
-
Security Strategies in Linux Platforms and Applications
Ingram 出版The third edition of Security Strategies in Linux Platforms and Applications covers every major asp
-
Hacking APIs
Ingram 出版Hacking APIs is a crash course in web API security testing that will prepare you to penetration-tes
-
Break the Internet
Scribe Us 出版Traditional media is over. The internet reigns. And in the attention economy, influencers are royal
-
Project Zero Trust
Wiley 出版Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a
-
Practical Industrial Cybersecurity
Wiley 出版A practical roadmap to protecting against cyberattacks in industrial environments In Practical Indu
-
Microsoft Certified Azure Data Fundamentals Study Guide with Online Labs: Exam Dp-900
Ingram 出版Everything you need to succeed on the MC Azure Data Fundamentals Exam, Now with 4 Online Lab Module
-
Cybersecurity Career Guide
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. A
-
Hardware Platform Security for Mobile Devices
Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for
-
The Jamstack Book
Jamstack = JavaScript, APIs, and Markup. Use established standard technologies to build super-fast
-
Social Media in the Digital Age
Ingram 出版Social Media in the Digital Age: History, Ethics, and Professional Uses details how the growth and
-
Beginning MERN Stack Development
Ingram 出版In this book, we take you on a fun, hands-on and pragmatic journey to learning MERN stack developme
-
-
Transformers for Machine Learning
Ingram 出版Transformers are becoming a core part of many neural network architectures, employed in a wide rang
-
-
Secure Data Management
Springer 出版The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data sec
-
Cloud Computing
Ingram 出版Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals with an
-
Inside Deep Learning
Ingram 出版Journey through the theory and practice of modern deep learning, and apply innovative techniques to
-
Comptia Cysa+ Guide to Cybersecurity Analyst (Cs0-002), Loose-Leaf Version
Develop the advanced cybersecurity knowledge and skills for success on the latest CompTIA Cybersecu
-
Cism Certified Information Security Manager Study Guide
Ingram 出版Sharpen your information security skills and grab an invaluable new credential with this unbeatable
-
Bundle: McSa Guide to Networking with Windows Server 2016, Exam 70-741+ Mindtap Networking, 1 Term (6 Months) Printed Access Card
Cengage 出版Students save money when purchasing bundled products. This bundle contains MCSA Guide to Networking
-
-
Bundle: Ethical Hacking and Countermeasures: Attack Phases, 2nd + Mindtap Information Security, 1 Term (6 Months) Printed Access Card
Cengage 出版Students save money when purchasing bundled products. This bundle contains Ethical Hacking and Coun
-
-