-
The Business Case for AI
Launch AI initiatives that get results with this step-by-step blueprint for business leaders.AI is
-
The Business Case for AI
Ingram 出版Launch AI initiatives that get results with this step-by-step blueprint for business leaders.AI is
-
The Art of Cyberwarfare
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as natio
-
Cybersecurity for Dummies
For Dummies 出版Explore the latest developments in cybersecurity with this essential guide Every day it seems we re
-
The Security Culture Playbook
Wiley 出版Mitigate human risk and bake security into your organization's culture from top to bottom with insi
-
Grokking Streaming Systems
A friendly, framework-agnostic tutorial that will help you grok how streaming systems work--and how
-
The Official (Isc)2 Sscp Cbk Reference
Ingram 出版The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security pro
-
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
Ingram 出版The rapid growth of the Internet interconnectivity and complexity of communication systems has led
-
Principles of Web Design
Ingram 出版Learn everything there is to know, from project planning through marketing and analytics, about Web
-
Fundamentals of Adopting the Nist Cybersecurity Framework
Ingram 出版Fundamentals of Adopting the NIST Cybersecurity Framework takes cybersecurity and business professi
-
Python for Cybersecurity
Wiley 出版Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For
-
Platform Engineering on Kubernetes
Empower your team with platforms built on top of Kubernetes using open source tools. Adopting Kuber
-
Cloud Computing Security
Cloud services have revolutionized computing in the modern world. In an increasingly networked ecos
-
Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, i
-
The Official (Isc)2 Ccsp Cbk Reference
Sybex 出版The only official body of knowledge for CCSP--the most popular cloud security credential--fully rev
-
Silicon Valley Cybersecurity Conference
Springer 出版This book constitutes selected and revised papers from the Second Silicon Valley Cybersecurity Conf
-
Data Privacy
Ingram 出版Engineer privacy into your systems with these hands-on techniques for data governance, legal compli
-
Autonomous Enterprise
Ingram 出版The journey towards the autonomous enterprise has begun; there are already companies operating in a
-
Non-Fungible Tokens (NFTs) Collections Logbook for Investors NFT creator notepad NFT trader notebook NFT collector organiser Trade planner 50 pages, A5. Log and track your assets with with Elbook NFTS
Lulu.com 出版Hardcover super easy to use Non-Fungible Tokens (NFTs) Collections LogBook for Investors. $ Plan an
-
(Isc)2 Sscp Systems Security Certified Practitioner Official Study Guide
Ingram 出版The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Pract
-
Expressing Information Flow Properties
With information comes responsibility: a responsibility to use information according to appropriate
-
Cybersafe for Humans
Publishdrive 出版Are you ready to protect your online life but don't know where to start? From keeping your kids and
-
The Ciso Evolution
Wiley 出版Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Busine
-
Fill in the Blank Search Engine Optimization Workbook
Ingram 出版SEO Made EasyGet to the top of Google search results with the Fill in the Blank Search Engine Optim
-
On Social Media
An internet writer first and foremost makes his first foray into the world of print. Influenced by
-
Validity, Reliability, and Significance
Empirical methods are means to answering methodological questions of empirical sciences by statisti
-
Cybersafe for Business
Publishdrive 出版By the time you finish reading this, your business could be a victim of one of the hundreds of cybe
-
Fundamentals of Information Systems Security
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of t
-
Presenting Design Work
Ingram 出版Do you love doing design work, but dread the inevitable design reviews that follow? Dread no more!
-
Aws Certified Machine Learning Study Guide
Ingram 出版Succeed on the AWS Machine Learning exam or in your next job as a machine learning specialist on th
-
What the F*ck Is the Cloud?
What the f*ck is the Cloud, and how does it even work? Ah, The Cloud. It's such a useful bit of tec
-
What the F*ck Is the Dark Web?
Ingram 出版What the f*ck is the Dark Web, and how does it even work? Whether it's from dodgy acronym-titled cr
-
Avoiding Predators Online
One of the most dangerous things that can happen to a young user on the Internet is to be contacted
-
The IDEAS of Leadership
Lulu.com 出版Jay Franze and Mindy Jo Rigel teach leadership through a framework they call IDEAS: Innovation, Dev
-
Build a Website Now
Ingram 出版2021 Edition - Updated November 2021- Step by step- Learn by examples- Covers HTML, CSS and Bootstr
-
Automated Essay Scoring
This book discusses the state of the art of automated essay scoring, its challenges and its potenti
-
Introduction Coding
Ingram 出版You Will Never Stop Using This Awesome book! Curious To Know More About Programming And Improve You
-
What is Cloud Computing
Ingram 出版Cloud computing is a technology that uses the internet and central remote servers to maintain data
-
Introduction Coding Python
Ingram 出版You Will Never Stop Using This Awesome book!Curious To Know More About Programming And Improve Your
-
Comptia Network+ N10-008 Cert Guide, Deluxe Edition
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare,
-
-
Deployment of a VPN architecture for data exchange
Not long ago, companies could afford to build their own LANs, supporting their own naming systems,
-
Syst癡mes de r矇putation dans Web3
Les structures organisationnelles passent des entreprises hi矇rarchiques classiques d'avant l'矇merge
-
Ethical Hacking
A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting
-
Information Security and Cryptology
Springer 出版This book constitutes the post-conference proceedings of the 17th International Conference on Infor
-
Cwdp-304
This book is a study guide for the CWDP-304 exam and a reference guide to help you master 802.11 wi
-
Surveillance de sant矇 des structures g矇nies civiles
Les travaux de ce livre consistent ? exploiter le domaine de la surveillance de sant矇 structurale S
-
Advances in Digital Forensics XVII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation