-
Web Application Development with Streamlit
Apress 出版Transition from a back-end developer to a full-stack developer with knowledge of all the dimensions
-
Safety and Security of Cyber-Physical Systems
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with e
-
Build a Personal Brand and Find the Right Niche
Max Alices 出版Do you want to know how to build your personal brand on social media? Your customers will never s
-
-
Blockchain Security from the Bottom Up
Wiley 出版The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from th
-
Ethical Hacking: Techniques, Tools, and Countermeasures
Ingram 出版Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategie
-
Internet and Web Application Security
Ingram 出版Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mob
-
Secret Key Cryptography
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical met
-
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Wiley 出版The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles
-
Networks Rising
Ingram 出版For the second time in human history, we are on the verge of broad new breakthroughs in health, pro
-
Linux Fundamentals
Ingram 出版The Linux world is constantly changing, requiring new knowledge and skills to work as a Linux syste
-
Cybersecurity Essentials
About the BookIf you need to read only one book to acquire a strong foundation in cybersecurity fun
-
Briefs Anthology Volume 3
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 2
Ingram 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Briefs Anthology Volume 1
Book Apart 出版Briefer than our already-concise standard titles, our digital-only Briefs series launched in 2016 a
-
Deep Learning with R, Second Edition
Deep learning from the ground up using R and the powerful Keras library! In Deep Learning with R,
-
Security Engineering for Embedded and Cyber-Physical Systems
CRC Press 出版Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at
-
Exploration of Novel Intelligent Optimization Algorithms
Springer 出版This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, hel
-
The Weakest Link
Mit Press 出版An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and ac
-
Assured Autonomy Survey
Autonomous systems will soon be ubiquitous in our society, saving us time, performing tasks we do n
-
Web Search Engines With Particular Reference
There are many search engines that facilitate information retrieval from the World Wide Web. Howeve
-
Executive’s Guide to Cyber Risk
Wiley 出版A solid, non-technical foundation to help executives and board members understand cyber risk In t
-
If It’s Smart, It’s Vulnerable
Wiley 出版Reimagine the future of the internet All our devices and gadgets--from our refrigerators to our h
-
-
Information Security Breaches
This pocket guide provides a general discussion of what information security breaches are, how they
-
Navigate Testprep for Fundamentals of Information Systems Security with Cloud Labs
Navigate TestPrep for Fundamentals of Information Systems Security, Fourth Edition is a digital-onl
-
It Induction and Information Security Awareness
Ingram 出版Where your information security is concerned, prevention is better than cure. If you want to tackle
-
The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks
Ingram 出版In the world as we know it, you can be attacked both physically and virtually. For today's organisa
-
Fundamentals of Information Systems Security with Navigate Testprep
Navigate TestPrep for Fundamentals of Information Systems Security, Fourth Edition is a digital-onl
-
Two-Factor Authentication
Passwords are not enough A password is a single authentication factor - anyone who has it can use i
-
Seo 2022
Learn SEO and rank at the top of Google with SEO 2022, beginner to advanced! Recently updated. Expa
-
-
Gpt-3
GPT-3: NLP with LLMs is a unique, pragmatic take on Generative Pre-trained Transformer 3, the famou
-
Security Awareness: Applying Practical Cybersecurity in Your World
Cengage 出版Designed to provide you with the knowledge and skills needed to protect your technology devices fro
-
The Internet of Things
As more and more devices become interconnected through the Internet of Things (IoT), there is an ev
-
The Art of Mac Malware
Ingram 出版A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed t
-
OSPF Demystified With RFC
Lulu.com 出版OSPF Routing Protocol is the most used protocol in the world, especially in the world of service pr
-
Auditing It Infrastructures for Compliance
Ingram 出版The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at
-
-
Security Strategies in Linux Platforms and Applications
Ingram 出版The third edition of Security Strategies in Linux Platforms and Applications covers every major asp
-
Hacking APIs
Ingram 出版Hacking APIs is a crash course in web API security testing that will prepare you to penetration-tes
-
Break the Internet
Scribe Us 出版Traditional media is over. The internet reigns. And in the attention economy, influencers are royal
-
Microsoft Certified Azure Data Fundamentals Study Guide with Online Labs: Exam Dp-900
Ingram 出版Everything you need to succeed on the MC Azure Data Fundamentals Exam, Now with 4 Online Lab Module
-
Project Zero Trust
Wiley 出版Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About
-
Practical Industrial Cybersecurity
Wiley 出版A practical roadmap to protecting against cyberattacks in industrial environments In Practical In
-
Cybersecurity Career Guide
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. A
-
Hardware Platform Security for Mobile Devices
Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for
-
The Jamstack Book
Ingram 出版Jamstack = JavaScript, APIs, and Markup. Use established standard technologies to build super-fast