-
Beginning MERN Stack Development
Ingram 出版In this book, we take you on a fun, hands-on and pragmatic journey to learning MERN stack developme
-
-
SAP S/4hana Cloud
SAP Press 出版SAP S/4HANA Cloud has a lot to offer--see what's possible! Explore core functionality like finance,
-
How to Start and Grow a Successful Podcast
The only guide you need to build a podcast from scratch with tips, techniques and stories from the
-
Transformers for Machine Learning
Ingram 出版Transformers are becoming a core part of many neural network architectures, employed in a wide rang
-
-
Secure Data Management
Springer 出版The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data sec
-
Cloud Computing
Ingram 出版Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals with an
-
Inside Deep Learning
Ingram 出版Journey through the theory and practice of modern deep learning, and apply innovative techniques to
-
Comptia Cysa+ Guide to Cybersecurity Analyst (Cs0-002), Loose-Leaf Version
Develop the advanced cybersecurity knowledge and skills for success on the latest CompTIA Cybersecu
-
Cism Certified Information Security Manager Study Guide
Ingram 出版Sharpen your information security skills and grab an invaluable new credential with this unbeatable
-
-
-
-
-
-
Dynamic Dreamweaver MX
Apress 出版This book gets you up to speed on using Macromedia Dreamweaver MX, the new version of Macromedia's
-
Dreamweaver MX
Apress 出版ASP.NET is the latest version of Microsoft's Active Server Pages (ASP), the incredibly popular serv
-
Developing Trust
Apress 出版Although the very nature of electronic security makes it such a rapidly evolving beast that at time
-
Cybersecurity for Small Networks
Ingram 出版A guide to implementing DIY security solutions and readily available technologies to protect home a
-
The Business Case for AI
Launch AI initiatives that get results with this step-by-step blueprint for business leaders. AI is
-
The Business Case for AI
Ingram 出版Launch AI initiatives that get results with this step-by-step blueprint for business leaders.AI is
-
The Art of Cyberwarfare
Ingram 出版A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as natio
-
Cybersecurity for Dummies
For Dummies 出版Explore the latest developments in cybersecurity with this essential guide Every day it seems w
-
Hacking for Dummies
For Dummies 出版Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and des
-
The Security Culture Playbook
Wiley 出版Mitigate human risk and bake security into your organization's culture from top to bottom with insi
-
Grokking Streaming Systems
A friendly, framework-agnostic tutorial that will help you grok how streaming systems work--and how
-
The Official (Isc)2 Sscp Cbk Reference
Ingram 出版The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security pro
-
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
Ingram 出版The rapid growth of the Internet interconnectivity and complexity of communication systems has led
-
-
SAP Analytics Cloud
SAP Press 出版What's new with BI? In this complete guide, you'll learn to configure SAP Analytics Cloud and conne
-
Principles of Web Design
Allworth 出版Learn everything there is to know, from project planning through marketing and analytics, about Web
-
Fundamentals of Adopting the Nist Cybersecurity Framework
Ingram 出版Fundamentals of Adopting the NIST Cybersecurity Framework takes cybersecurity and business professi
-
-
Python for Cybersecurity
Wiley 出版Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python Fo
-
Platform Engineering on Kubernetes
Empower your team with platforms built on top of Kubernetes using open source tools. Adopting Kuber
-
Application Security Program Handbook
Ingram 出版Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practica
-
Cloud Computing Security
Cloud services have revolutionized computing in the modern world. In an increasingly networked ecos
-
Social Engineering
Mit Press 出版Manipulative communication--from early twentieth-century propaganda to today's online con artistry-
-
Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition
Ingram 出版Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated,
-
The Official (Isc)2 Ccsp Cbk Reference
Sybex 出版The only official body of knowledge for CCSP--the most popular cloud security credential--fully rev
-
Silicon Valley Cybersecurity Conference
Springer 出版This book constitutes selected and revised papers from the Second Silicon Valley Cybersecurity Conf
-
Data Privacy
Ingram 出版Engineer privacy into your systems with these hands-on techniques for data governance, legal compli
-
Autonomous Enterprise
Ingram 出版The journey towards the autonomous enterprise has begun; there are already companies operating in a
-
Adobe Dreamweaver Classroom in a Book (2022 Release)
Adobe Press 出版Learn how to create webpages for the modern web; incorporate graphics and text; build rich interact
-
Non-Fungible Tokens (NFTs) Collections Logbook for Investors NFT creator notepad NFT trader notebook NFT collector organiser Trade planner 50 pages, A5. Log and track your assets with with Elbook NFTS
Lulu.com 出版Hardcover super easy to use Non-Fungible Tokens (NFTs) Collections LogBook for Investors. $ Plan an
-
(Isc)2 Sscp Systems Security Certified Practitioner Official Study Guide
Ingram 出版The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Pra
-
Expressing Information Flow Properties
Ingram 出版With information comes responsibility: a responsibility to use information according to appropriate