-
Cybersafe for Humans
Publishdrive 出版Are you ready to protect your online life but don't know where to start? From keeping your kids and
-
The Ciso Evolution
Wiley 出版Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Busi
-
-
Fill in the Blank Search Engine Optimization Workbook
Ingram 出版SEO Made Easy Get to the top of Google search results with the Fill in the Blank Search Engine Opti
-
On Social Media
An internet writer first and foremost makes his first foray into the world of print. Influenced by
-
Go H*ck Yourself
Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on i
-
Validity, Reliability, and Significance
Empirical methods are means to answering methodological questions of empirical sciences by statisti
-
Cybersafe for Business
Publishdrive 出版By the time you finish reading this, your business could be a victim of one of the hundreds of cybe
-
Java: A Beginner’s Guide, Ninth Edition
A practical introduction to Java programming--fully revised for the latest version, Java SE 17 Tho
-
Fundamentals of Information Systems Security
Ingram 出版Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of t
-
The CSS Anthology
Sitepoint 出版Note: A new edition of this book has been released. Please look for The CSS Anthology, 2nd Edition
-
Presenting Design Work
Ingram 出版Do you love doing design work, but dread the inevitable design reviews that follow? Dread no more!
-
Aws Certified Machine Learning Study Guide
Ingram 出版Succeed on the AWS Machine Learning exam or in your next job as a machine learning specialist on th
-
Practical Linux Forensics
A resource to help forensic investigators locate, analyze, and understand digital evidence found on
-
What the F*ck Is the Dark Web?
What the f*ck is the Dark Web, and how does it even work? Whether it's from dodgy acronym-titled cr
-
-
Du-Badu Guftagu
Blurb 出版Collection of interviews on Urdu Newspaper and Magazines. Collection of interviews on Urd Newspaper
-
Making Sense of Cybersecurity
Ingram 出版A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect
-
The IDEAS of Leadership
Lulu.com 出版Jay Franze and Mindy Jo Rigel teach leadership through a framework they call IDEAS: Innovation, Dev
-
Avoiding Predators Online
One of the most dangerous things that can happen to a young user on the Internet is to be contacted
-
Build a Website Now
Ingram 出版2021 Edition - Updated November 2021 - Step by step - Learn by examples - Covers HTML, CSS and Boot
-
Automated Essay Scoring
This book discusses the state of the art of automated essay scoring, its challenges and its potenti
-
Introduction Coding
Ingram 出版You Will Never Stop Using This Awesome book! Curious To Know More About Programming And Improve You
-
What is Cloud Computing
Ingram 出版Cloud computing is a technology that uses the internet and central remote servers to maintain data
-
SEO for Small Business Part 1
SEO for Small BusinessesSEO for Small Businesses Part 1: SEO and Keyword Research or the SEO or Sea
-
Introduction Coding Python
Ingram 出版You Will Never Stop Using This Awesome book!Curious To Know More About Programming And Improve Your
-
Comptia Network+ N10-008 Cert Guide, Deluxe Edition
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare,
-
-
Deployment of a VPN architecture for data exchange
Not long ago, companies could afford to build their own LANs, supporting their own naming systems,
-
Syst癡mes de r矇putation dans Web3
Les structures organisationnelles passent des entreprises hi矇rarchiques classiques d'avant l'矇merge
-
Ethical Hacking
Ingram 出版A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting
-
Information Security and Cryptology
Springer 出版This book constitutes the post-conference proceedings of the 17th International Conference on Infor
-
Cwdp-304
This book is a study guide for the CWDP-304 exam and a reference guide to help you master 802.11 wi
-
Modello di costo per HPCaaS sul cloud
Il cloud computing 癡 l'ultima tecnologia utilizzata nella maggior parte delle imprese. Quasi tutte
-
Surveillance de sant矇 des structures g矇nies civiles
Les travaux de ce livre consistent ? exploiter le domaine de la surveillance de sant矇 structurale S
-
Advances in Digital Forensics XVII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Cyberwarfare: Information Operations in a Connected World
Ingram 出版Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefie
-
Computer Security and the Internet
Springer 出版This book provides a concise yet comprehensive overview of computer and Internet security, suitable
-
Desempenho da conectividade de rede e consumo de energia Rede Ad-Hoc
As comunica癟繭es sem fios s瓊o actualmente uma tecnologia de comunica癟瓊o altamente exigida que 矇 a ma
-
VoIP with Asterisk
This book is about the world's most widely used open source IP telephony system Asterisk. During th
-
Ransomware Protection Playbook
Wiley 出版Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT
-
Modeling and Optimization in Software-Defined Networks
This book provides a quick reference and insights into modeling and optimization of software-define
-
Modeling and Optimization in Software-Defined Networks
This book provides a quick reference and insights into modeling and optimization of software-define
-
The Wires of War
From the former news policy lead at Google, an urgent and groundbreaking account of the high-stakes
-
Cwap-404
This book is a study guide for the CWAP-404 exam and a reference guide to help you master 802.11 wi
-
Artificial Neural Networks: Methods and Applications in Fractional Order Systems
This is the first book that uses Artificial Neural Networks (ANN) to solve fractional order systems
-
Don't Wait, Create
Ingram 出版What do Justin Bieber, Lilly Singh, and Andy Samberg have in common? They all launched their career
-