-
Two-Factor Authentication
Passwords are not enough A password is a single authentication factor - anyone who has it can use i
-
-
-
Security Awareness: Applying Practical Cybersecurity in Your World
Cengage 出版Designed to provide you with the knowledge and skills needed to protect your technology devices fro
-
-
-
-
-
-
-
-
Building Wireless Community Community Networks
O’Reilly Me 出版Building Wireless Community Networks is about getting people online using wireless network technolo
-
-
-
-
-
-
-
-
The Jamstack Book
Jamstack = JavaScript, APIs, and Markup. Use established standard technologies to build super-fast
-
Beginning MERN Stack Development
Ingram 出版In this book, we take you on a fun, hands-on and pragmatic journey to learning MERN stack developme
-
-
-
-
Transformers for Machine Learning
Ingram 出版Transformers are becoming a core part of many neural network architectures, employed in a wide rang
-
-
Secure Data Management
Springer 出版The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data sec
-
Cloud Computing
Ingram 出版Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals with an
-
Inside Deep Learning
Ingram 出版Journey through the theory and practice of modern deep learning, and apply innovative techniques to
-
Comptia Cysa+ Guide to Cybersecurity Analyst (Cs0-002), Loose-Leaf Version
Develop the advanced cybersecurity knowledge and skills for success on the latest CompTIA Cybersecu
-
Cism Certified Information Security Manager Study Guide
Ingram 出版Sharpen your information security skills and grab an invaluable new credential with this unbeatable
-
-
-
-
-
-
-
-
-
-
-
-
The Business Case for AI
Ingram 出版Launch AI initiatives that get results with this step-by-step blueprint for business leaders.AI is
-
-
-
-
-
The Security Culture Playbook
Wiley 出版Mitigate human risk and bake security into your organization's culture from top to bottom with insi