-
The Ciso Evolution
Wiley 出版Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Busine
-
Fill in the Blank Search Engine Optimization Workbook
Ingram 出版SEO Made EasyGet to the top of Google search results with the Fill in the Blank Search Engine Optim
-
On Social Media
An internet writer first and foremost makes his first foray into the world of print. Influenced by
-
Go H*ck Yourself
Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on in
-
中南海厚黑學:中共不能說的秘密
目前有6人說過讚允晨文化 出版 16-18歲適讀《中南海厚黑學》揭示中共統治的骯髒秘密。解剖中共高人的陰暗心理、詭詐權謀,也拆穿他們的統治花招、混世雜技。而形形色色所謂「主義」、「理論」、「口號」,本身就是厚黑產物。諸如鄧小平的「穩定壓倒一切」、
-
2008年總統選舉:論二次政黨輪
五南 出版2008年總統選舉,對台灣的民主發展有關鍵的影響。本書深入分析,在這締造第二次政黨輪替之關鍵選舉中,形塑選民參與及投票抉擇的重要因素為何。書中各章探討下列問題:立委選舉對總統選舉的影響,究竟是「西瓜
-
Validity, Reliability, and Significance
Empirical methods are means to answering methodological questions of empirical sciences by statisti
-
Cybersafe for Business
Publishdrive 出版By the time you finish reading this, your business could be a victim of one of the hundreds of cybe
-
Java: A Beginner’s Guide, Ninth Edition
A practical introduction to Java programming--fully revised for the latest version, Java SE 17 Thor
-
Fundamentals of Information Systems Security
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of t
-
The CSS Anthology
Sitepoint 出版Note: A new edition of this book has been released. Please look for The CSS Anthology, 2nd Edition
-
Presenting Design Work
Ingram 出版Do you love doing design work, but dread the inevitable design reviews that follow? Dread no more!
-
Aws Certified Machine Learning Study Guide
Ingram 出版Succeed on the AWS Machine Learning exam or in your next job as a machine learning specialist on th
-
-
Practical Linux Forensics
A resource to help forensic investigators locate, analyze, and understand digital evidence found on
-
-
What the F*ck Is the Dark Web?
Ingram 出版What the f*ck is the Dark Web, and how does it even work? Whether it's from dodgy acronym-titled cr
-
What the F*ck Is the Cloud?
What the f*ck is the Cloud, and how does it even work? Ah, The Cloud. It's such a useful bit of tec
-
Du-Badu Guftagu
Blurb 出版Collection of interviews on Urdu Newspaper and Magazines. Collection of interviews on Urd Newspaper
-
Making Sense of Cybersecurity
Ingram 出版A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect
-
The IDEAS of Leadership
Lulu.com 出版Jay Franze and Mindy Jo Rigel teach leadership through a framework they call IDEAS: Innovation, Dev
-
Avoiding Predators Online
One of the most dangerous things that can happen to a young user on the Internet is to be contacted
-
Build a Website Now
Ingram 出版2021 Edition - Updated November 2021- Step by step- Learn by examples- Covers HTML, CSS and Bootstr
-
Automated Essay Scoring
This book discusses the state of the art of automated essay scoring, its challenges and its potenti
-
Introduction Coding
Ingram 出版You Will Never Stop Using This Awesome book! Curious To Know More About Programming And Improve You
-
What is Cloud Computing
Ingram 出版Cloud computing is a technology that uses the internet and central remote servers to maintain data
-
SEO for Small Business Part 1
SEO for Small BusinessesSEO for Small Businesses Part 1: SEO and Keyword Research or the SEO or Sea
-
Introduction Coding Python
Ingram 出版You Will Never Stop Using This Awesome book!Curious To Know More About Programming And Improve Your
-
Comptia Network+ N10-008 Cert Guide, Deluxe Edition
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare,
-
-
-
Deployment of a VPN architecture for data exchange
Not long ago, companies could afford to build their own LANs, supporting their own naming systems,
-
Syst癡mes de r矇putation dans Web3
Les structures organisationnelles passent des entreprises hi矇rarchiques classiques d'avant l'矇merge
-
Information Security and Cryptology
Springer 出版This book constitutes the post-conference proceedings of the 17th International Conference on Infor
-
Ethical Hacking
Ingram 出版A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting
-
Cwdp-304
This book is a study guide for the CWDP-304 exam and a reference guide to help you master 802.11 wi
-
Surveillance de sant矇 des structures g矇nies civiles
Les travaux de ce livre consistent ? exploiter le domaine de la surveillance de sant矇 structurale S
-
Advances in Digital Forensics XVII
Springer 出版Digital forensics deals with the acquisition, preservation, examination, analysis and presentation
-
Modello di costo per HPCaaS sul cloud
Il cloud computing 癡 l'ultima tecnologia utilizzata nella maggior parte delle imprese. Quasi tutte
-
Cyberwarfare: Information Operations in a Connected World
Ingram 出版Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefie
-
Computer Security and the Internet
Springer 出版This book provides a concise yet comprehensive overview of computer and Internet security, suitable
-
Desempenho da conectividade de rede e consumo de energia Rede Ad-Hoc
As comunica癟繭es sem fios s瓊o actualmente uma tecnologia de comunica癟瓊o altamente exigida que 矇 a ma
-
VoIP with Asterisk
This book is about the world's most widely used open source IP telephony system Asterisk. During th
-
Ransomware Protection Playbook
Wiley 出版Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Gl
-
Modeling and Optimization in Software-Defined Networks
This book provides a quick reference and insights into modeling and optimization of software-define
-
Modeling and Optimization in Software-Defined Networks
This book provides a quick reference and insights into modeling and optimization of software-define
-
The Wires of War
From the former news policy lead at Google, an urgent and groundbreaking account of the high-stakes
-
Cwap-404
This book is a study guide for the CWAP-404 exam and a reference guide to help you master 802.11 wi