-
Digital Dictatorship
Vij Books 出版A world without chains can still be a prison. Today's most powerful regimes-whether in Beijing, Sil
-
Python Networking 101, Second Edition
Gitforgits 出版If you're a developer getting into networking for the first time or an IT pro looking to build prac
-
C++ Networking 101, Second Edition
Gitforgits 出版The point of this edition is to help C++ programmers get the skills and confidence they need to do
-
Practical IoT Solutions for Students Using Popular Development Platforms
Eliva Press 出版Practical IoT Solutions for Students Using Popular Development Platforms: Arduino, Raspberry Pi and
-
AHS Internet Password Logbook
Remembering internet passwords and usernames has never been more beautiful! Easily store this preci
-
Security for Everyone
Holloway 出版Securing your business can be daunting, especially when you're small. That's why Security for Every
-
They Lied About SEO
Vizzybrand 出版They Lied About SEO is the no-fluff, real-world guide for small business owners, content creators,
-
Security for Everyone
Holloway 出版Securing your business can be daunting, especially when you're small. That's why Security for Every
-
Future-Ready with Generative AI
CRC Press 出版For the first time in history, the most powerful artificial intelligence (AI) works through languag
-
Cybersecurity For Beginners
Ingram 出版Gain mastery over Cybersecurity Essentials without being overwhelmed by technical jargon or prior t
-
AI and ADA
Ingram 出版Preface The book's Preface places the current AI explosion in the context of other technological ca
-
AI and ADA
Preface The book's Preface places the current AI explosion in the context of other technological ca
-
The $10 Million Instagram Funnel
Brian Mark shares the proven strategies used to grow a thriving online coaching company without pai
-
The $10 Million Instagram Funnel
In $10 Million Instagram Funnel, Brian Mark shares the proven strategies he used to grow a thriving
-
Cybersecurity Mistakes for SMBs to avoid
Acrasolution 出版Cybersecurity Mistakes to Avoid: How to Protect Your Small Business from Costly ThreatsMost busines
-
The Podcast Pantheon
Spanning the most popular podcast genres--true crime, comedy, sports, relationships, and more--cult
-
Computer Safety, Reliability, and Security. Safecomp 2025 Workshops
Springer 出版This book constitutes the proceedings of the Workshops held in conjunction with the 44th Internatio
-
Computer Safety, Reliability, and Security
Springer 出版This book constitutes the refereed proceedings of the 44th International Conference on Computer Saf
-
The Social Media Trap - How to Protect Your Mental Health in a Digital World
Social media was designed to connect us-but for many, it's doing the opposite. Anxiety, comparison,
-
Advanced Technologies in Electronics, Communications and Signal Processing
Springer 出版This book LNICST 620 constitutes the proceedings of the First EAI International Conference on Advan
-
Advanced Technologies in Electronics, Communications and Signal Processing
Springer 出版This book LNICST 619 constitutes the proceedings of the First EAI International Conference on Advan
-
Dark Web Reality
Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret
-
Dark Web Reality
Step beyond the headlines and into the shadows of the internet's most mysterious realm.From secret
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Understanding Artificial Intelligence
"Understanding Artificial Intelligence: Fundamentals and Applications" is an essential resource des
-
Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide
As cloud technology becomes increasingly essential across industries, the need for thorough securit
-
Learning Ransomware Response & Recovery
Ransomware attacks are no longer a question of if--they're a matter of when. With hackers increasin
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Advances in Cryptology - Crypto 2025
Springer 出版The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryp
-
Guardians of the Digital Age
CRC Press 出版A thrilling bridge between past and future, this book introduces parents and teens to the evolution
-
Understanding the Human Factor in Cyber Security
Ingram 出版In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in
-
Wireshark Essentials
CRC Press 出版Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utili
-
The Cyber Shield
FriesenPress 出版Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the
-
The Cyber Shield
FriesenPress 出版Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the
-
Traditional vs Generative AI Pentesting
CRC Press 出版Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving lands
-
Machine Learning and Deep Learning in Natural Language Processing
CRC Press 出版This book aims at providing a review of current Neural Network techniques in the NLP. The book is i
-
Guardians of the Digital Age
CRC Press 出版A thrilling bridge between past and future, this book introduces parents and teens to the evolution
-
Intelligent Approaches to Cyber Security
CRC Press 出版Intelligent Approach to Cyber Security provides details on the important cyber security threats and
-
Traditional vs Generative AI Pentesting
CRC Press 出版Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving lands
-
Data Engineering for Cybersecurity
Turn raw logs into real intelligence. Security teams rely on telemetry--the continuous stream of lo
-
-
Big Data and Social Computing
Springer 出版This book constitutes the refereed proceedings of the 10th China National Conference on Big Data an
-
Modern REST API Development in Go
Packt 出版Master REST API design in Go in a pragmatic way by building production-ready web services using the
-
Building Effective Privacy Programs
Wiley 出版Presents a structured approach to privacy management, an indispensable resource for safeguarding da