No more slips of paper with passwords jotted down! Gooseberry Patch watercolor artwork makes organizing your websites fu......more
Keep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a modern floral design. I......more
Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed notebook featuring a moder......more
With enough space to record usernames, passwords, and security questions, this book will help you keep track of all thos......more
An easy-to-read large font book to store passwords and other important information that is important to not forget. The ......more
Let Peep & Squeak help you find those hard to remember things ... we all have to keep so much in our heads! Now indexed ......more
Are you looking for expert guidance and engaging tools to help students navigate their complex digital world? Advanced t......more
Prajnaketu takes us into the world of the cyberloka - the online realm in which so much of our lives now take place. In ......more
"Ah, The Cloud. It’s such a useful bit of tech jargon isn’t it? The kind that’s casually thrown around in work meetings ......more
"Whether it’s from dodgy acronym-titled crime shows to news stories designed to terrify you down to your socks we’ve all......more
"Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data revolution to reimagine......more
Online Anonymity is the concept where the identities of communicators are kept secret. Online privacy is more than just ......more
This book is a comprehensive guide to understanding the current state and future potential of VR and AR. It provides ins......more
The internet can help you achieve financial freedom to live your dreams and to design the perfect lifestyle. As an inter......more
Detailed or concise reviews of the best applications and solutions are highlighted throughout the reading. Many of the k......more
This book will show you numerous ways in which the average person can increase the traffic to their website. In this boo......more
As the founder of the linux training academy and an instructor of several courses, i’ve had the good fortune of helping ......more
For the second time in human history, we are on the verge of broad new breakthroughs in health, productivity, and person......more
"Cybersecurity’s Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide" is a definitive exploratio......more
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their......more
...more
The "Bridging the Digital Part" program, which offers a thorough review of youth-driven web actions aimed at furthering ......more
Stanton writes with terrific verve and precision . . . his understanding of the seductive pleasures of gaming takes us r......more
The 2020 revelations of cyber espionage targeting multiple U.S. government and private sector organizations highlighted ......more
The digital world is a place where even the most informed parents and teachers can feel one pace behind children. Bombar......more
"This book debunks 10 myths about how hard it really is to design privacy-friendly systems" --...more
As mankind has progressed through the years, science and technology have enabled us to make leaps in our manufacturing, ......more
"Renowned ethical hacker and social engineer FC delivers a ... discussion of his work: testing the limits of physical ba......more
Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Sta......more
Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes S......more
A Metaverse is a digital space represented by digital representations of people, places, and things. In other words, it’......more
Your first step to understanding what the metaverse is all about You’ve probably heard that the metaverse--a word that s......more
...more
CYBERSECURITY: The Beginner’s Guide to Cybersecurity Meаsures. In а world where digitаl threаts аre аlwаys lurking, unde......more
Keep Reading If You Want To Make Good Money Online Without Wasting A Lot Of Time And Money... You are about to go on a t......more
Learn how to master the most lucrative internet business possibilities and attain financial independence! Even if you’ve......more
Do you want to learn how a computer network operates? Do you want to know what it takes to operate a home or business ne......more
"Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against p......more
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Alignin......more
"All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are goi......more
"Big tech" knows all your secrets and sells them to the highest bidder--this guide for the everyday tech user explains h......more
These cloud computing environments give the impression of boundless computing resources to cloud clients, allowing them ......more
"Enhancing Mobile Network Performance with Cross-Layer Design" investigates a cutting-edge approach to optimizing mobile......more
The concept that the undirected multiple-unicast network information capacity is the same as the routing capacity is one......more
The objective of the Transmission Control Protocol (TCP) is to provide reliable end-to-end delivery of data over unrelia......more
"Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data revolution to reimagine......more
���� The Ultimate Guide to System Design Looking to master the art of system design? Dive into this comprehensive guide ......more
���� Navigating the Tech Revolution: Your Comprehensive Guide Step into the future of technology with a book that covers......more
...more
" The most practical book ever written about modern digital marketing" - Jay Baer. The result of thousands of conversati......more
Global growth sets new records, poverty and illiteracy rates fall, technological innovation creates amazing opportunitie......more
Get a sneak peek into the future of technology, finance, and the metaverse In The Web3 Era: NFTs, the Metaverse, Blockch......more
The result of thousands of conversations about web marketing with hundreds of companies, this handbook is a compilation ......more
An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizationa......more
...more
Master the art of network security with this comprehensive guide. Dive deep into understanding network vulnerabilities, ......more
After mounting red flags caused Chris Smith to end a close relationship, he found his digital life under attack: account......more
Energy Optimization in Wireless Networks is a cutting-edge approach aimed at maximizing energy efficiency and prolonging......more
Immerse yourself in the offensive security mindset to better defend against attacks In The Active Defender: Immersion in......more
In "Networked Lives: Navigating the Online Social Networks," you will learn how to navigate the complexity of OSNs as we......more
"In The Technology Doesn’t Matter: Prioritizing the People in IT Business Alignment, veteran IT executive Rachel Lockett......more
Shashank Singh’s ground-breaking book "An Algorithm for 4G Mobile Network Using Vertical Handoff Approach" offers a thor......more
The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing a......more
For the second time in human history, we are on the verge of broad new breakthroughs in health, productivity, and person......more
To study the effect of mass media TV Internet and video games etc. on the psychological development of children, Mass me......more
Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on introduction to the wor......more
This research focuses on developing effective fault detection techniques for integrated sensor networks. Sensor networks......more
The "Queuing Theory for IoT Sensor Networks" explores a fundamental and powerful approach to optimize the performance an......more
This book describes a new method for hand vein recognition using biometrics, which is a method of recognizing a person b......more
In today’s world, smartphones have become an integral part of our lives, and we use them for various purposes such as co......more
Over the past thirty years, the Internet has transformed virtually every area of human activity, social and economic. Th......more
Do you desire a simple approach to manage your company’s finances but don’t consider yourself to be technically or mathe......more
"Augmented Realities: Connecting the Digital and Physical Worlds" is a book by Jonathan Smith. In his book "Augmented Re......more
Virtual reality (VR) and augmented reality (AR) navigation are rapidly evolving fields, and Emily Parker’s "VR/AR Naviga......more
...more
What exactly is Youtube Marketing? It is NOT a book that will teach you how to utilize this social network just to recei......more
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wir......more
A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Secu......more
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third......more
...more
The advancement in technology and increasing interest in the various emerging wireless products has lead to the exponent......more
With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is building a network of Int......more
The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chie......more
The Internet of Things is a many vision one paradigm technology that connects electrical, electronic and non electrical ......more
: LUHOHVV VHQVRU QHWZRUNV:61V KDYH EHFRPH SRSXODU ZRUOGZLGH GXH WR WKHLU ZLGH UDQJH RI DSSOLFDWLRQV OLNH IRUHVW ILUH PRQ......more
In today’s world, Internet of Things is an attention grabbing area of research. IoT has become popular because of the ev......more
The cloud data storage and retrieval-centric CSP represents the client’s environmental-centric encryption approaches to ......more
"Virtual Ethics: Navigating Augmented Realities" is a thought-provoking investigation of the ethical difficulties that d......more
Fraud Detection has great importance to Financial Institutions. The proposed research work is concerned with the problem......more
The untold story about how the internet became social, and why this matters for its future "A great book for anyone who ......more
While uses and studies of XR technology within STEM-based education have been plentiful in recent years, there has been ......more
"Updated to included expanded information on data resources, machine learning, artificial intelligence, and collaboratio......more
Internet is considered one of the twenty-first century’s greatest human inventions. The term internet was first introduc......more
An Overview of the Digital Nomad’s Way of Life The digital nomad lifestyle is on the rise in the modern world because it......more
Whether we realize it or not, we think of our brains as computers. In neuroscience, the metaphor of the brain as a compu......more
...more
In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin H......more
Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Ch......more
Construction of a Circuit in the Tor Network is a captivating and timely book that delves into the intriguing world of o......more