排序依

共有650

New Online Organizer

New Online Organizer

No more slips of paper with passwords jotted down! Gooseberry Patch watercolor artwork makes organizing your websites fu......more

Password Logbook (Hip Floral): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location

Password Logbook (Hip Floral): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location

Keep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a modern floral design. I......more

Password Logbook (Black & Gold): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location

Password Logbook (Black & Gold): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location

Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed notebook featuring a moder......more

The Peep and Squeak Password Assistance Book

The Peep and Squeak Password Assistance Book

With enough space to record usernames, passwords, and security questions, this book will help you keep track of all thos......more

The Peep & Squeak Easy-to-Read Password Assistance Book

The Peep & Squeak Easy-to-Read Password Assistance Book

An easy-to-read large font book to store passwords and other important information that is important to not forget. The ......more

The Peep & Squeak Easy-to-Read Password Assistance Book (with tabs)

The Peep & Squeak Easy-to-Read Password Assistance Book (with tabs)

Let Peep & Squeak help you find those hard to remember things ... we all have to keep so much in our heads! Now indexed ......more

15-Minute Focus: Digital Citizenship: Brief Counseling Techniques That Work

15-Minute Focus: Digital Citizenship: Brief Counseling Techniques That Work

Are you looking for expert guidance and engaging tools to help students navigate their complex digital world? Advanced t......more

Cyberloka: A Buddhist Guide to Digital Life

Cyberloka: A Buddhist Guide to Digital Life

  • Ingram,出版日期:2022-11-01

Prajnaketu takes us into the world of the cyberloka - the online realm in which so much of our lives now take place. In ......more

Wtf Is the Cloud?

Wtf Is the Cloud?

"Ah, The Cloud. It’s such a useful bit of tech jargon isn’t it? The kind that’s casually thrown around in work meetings ......more

Wtf Is the Dark Web?

Wtf Is the Dark Web?

"Whether it’s from dodgy acronym-titled crime shows to news stories designed to terrify you down to your socks we’ve all......more

Don’t Trust Your Gut: Using Data to Get What You Really Want in Life

Don’t Trust Your Gut: Using Data to Get What You Really Want in Life

"Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data revolution to reimagine......more

Dark Web: Guide to the Dark Web Journey into the Hidden Depths (This Guide to Its Mechanics and Risks Digital Fortitude Navigati

Dark Web: Guide to the Dark Web Journey into the Hidden Depths (This Guide to Its Mechanics and Risks Digital Fortitude Navigati

Online Anonymity is the concept where the identities of communicators are kept secret. Online privacy is more than just ......more

Online Privacy: How to Maintain Privacy on the Internet and Protect Your Money (How to Stay Anonymous in the Internet)

Online Privacy: How to Maintain Privacy on the Internet and Protect Your Money (How to Stay Anonymous in the Internet)

Detailed or concise reviews of the best applications and solutions are highlighted throughout the reading. Many of the k......more

Traffic Generation: How to Generate Traffic for Your Online Business (Simple Ways to Get More Traffic From the Search Engines)

Traffic Generation: How to Generate Traffic for Your Online Business (Simple Ways to Get More Traffic From the Search Engines)

This book will show you numerous ways in which the average person can increase the traffic to their website. In this boo......more

Linux: Learn Linux Command Line and Administration (Your Step-by-step Guide to Learning the Linux Operating System)

Linux: Learn Linux Command Line and Administration (Your Step-by-step Guide to Learning the Linux Operating System)

As the founder of the linux training academy and an instructor of several courses, i’ve had the good fortune of helping ......more

Networks Rising: Thinking Together in a Connected World

Networks Rising: Thinking Together in a Connected World

For the second time in human history, we are on the verge of broad new breakthroughs in health, productivity, and person......more

Cybersecurity’s Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide

Cybersecurity’s Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide

"Cybersecurity’s Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide" is a definitive exploratio......more

How to Hack Like a Legend

How to Hack Like a Legend

Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their......more

Bridging the Digital Part Evaluation of Youth Web Action For Education

Bridging the Digital Part Evaluation of Youth Web Action For Education

The "Bridging the Digital Part" program, which offers a thorough review of youth-driven web actions aimed at furthering ......more

A Brief History of Video Games: From Atari to Virtual Reality

A Brief History of Video Games: From Atari to Virtual Reality

Stanton writes with terrific verve and precision . . . his understanding of the seductive pleasures of gaming takes us r......more

Digital Children: A Guide for Adults

Digital Children: A Guide for Adults

The digital world is a place where even the most informed parents and teachers can feel one pace behind children. Bombar......more

Privacy Is Hard and Seven Other Myths: Achieving Privacy Through Careful Design

Privacy Is Hard and Seven Other Myths: Achieving Privacy Through Careful Design

"This book debunks 10 myths about how hard it really is to design privacy-friendly systems" --...more

The Fourth Industrial Revolution: How the Modern World Is Being Reshaped by AI and the Internet

The Fourth Industrial Revolution: How the Modern World Is Being Reshaped by AI and the Internet

As mankind has progressed through the years, science and technology have enabled us to make leaps in our manufacturing, ......more

How I Rob Banks

How I Rob Banks

  • FcIngram,出版日期:2023-06-07

"Renowned ethical hacker and social engineer FC delivers a ... discussion of his work: testing the limits of physical ba......more

Threats: What Every Engineer Should Learn from Star Wars

Threats: What Every Engineer Should Learn from Star Wars

Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Sta......more

Data Sanitization: A Complete Guide to Managing Data Erasure

Data Sanitization: A Complete Guide to Managing Data Erasure

Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes S......more

Metaverse for Dummies

Metaverse for Dummies

Your first step to understanding what the metaverse is all about You’ve probably heard that the metaverse--a word that s......more

Cybersecurity: The Beginner’s Guide to Cybersecurity Measures

Cybersecurity: The Beginner’s Guide to Cybersecurity Measures

CYBERSECURITY: The Beginner’s Guide to Cybersecurity Meаsures. In а world where digitаl threаts аre аlwаys lurking, unde......more

Fighting Phishing: Deploying Defense-In-Depth to Defeat Hackers and Malware

Fighting Phishing: Deploying Defense-In-Depth to Defeat Hackers and Malware

"Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against p......more

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Alignin......more

If It’’s Smart, It’’s Vulnerable

If It’’s Smart, It’’s Vulnerable

"All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are goi......more

Your Data, Their Billions: Unraveling and Simplifying Big Tech

Your Data, Their Billions: Unraveling and Simplifying Big Tech

"Big tech" knows all your secrets and sells them to the highest bidder--this guide for the everyday tech user explains h......more

Energy Optimization Algorithm for Virtual Machine Scheduling in Cloud Computing

Energy Optimization Algorithm for Virtual Machine Scheduling in Cloud Computing

These cloud computing environments give the impression of boundless computing resources to cloud clients, allowing them ......more

Enhancing Mobile Network Performance with Cross-Layer Design

Enhancing Mobile Network Performance with Cross-Layer Design

"Enhancing Mobile Network Performance with Cross-Layer Design" investigates a cutting-edge approach to optimizing mobile......more

Information Flow in Undirected Unicast Networks

Information Flow in Undirected Unicast Networks

The concept that the undirected multiple-unicast network information capacity is the same as the routing capacity is one......more

Optimized TCP Congestion Control Protocol

Optimized TCP Congestion Control Protocol

The objective of the Transmission Control Protocol (TCP) is to provide reliable end-to-end delivery of data over unrelia......more

Don’’t Trust Your Gut: Using Data Instead of Instinct to Make Better Choices

Don’’t Trust Your Gut: Using Data Instead of Instinct to Make Better Choices

"Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data revolution to reimagine......more

System Design Interview Book 1: An Advanced Insider’s Guide

System Design Interview Book 1: An Advanced Insider’s Guide

���� The Ultimate Guide to System Design Looking to master the art of system design? Dive into this comprehensive guide ......more

System Design Interview Book 2: An Insider’s Guide

System Design Interview Book 2: An Insider’s Guide

���� Navigating the Tech Revolution: Your Comprehensive Guide Step into the future of technology with a book that covers......more

Digital Libido: Sex, Power and Violence in the Network Society

Digital Libido: Sex, Power and Violence in the Network Society

Global growth sets new records, poverty and illiteracy rates fall, technological innovation creates amazing opportunitie......more

The Web3 Era: Nfts, the Metaverse, Blockchain and the Future of the Decentralized Internet

The Web3 Era: Nfts, the Metaverse, Blockchain and the Future of the Decentralized Internet

Get a sneak peek into the future of technology, finance, and the metaverse In The Web3 Era: NFTs, the Metaverse, Blockch......more

Content Chemistry: The Illustrated Handbook for Content Marketing

Content Chemistry: The Illustrated Handbook for Content Marketing

The result of thousands of conversations about web marketing with hundreds of companies, this handbook is a compilation ......more

The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizationa......more

The Dark Side of Networking: Advanced Techniques for Breaching and Protecting Networks

The Dark Side of Networking: Advanced Techniques for Breaching and Protecting Networks

Master the art of network security with this comprehensive guide. Dive deep into understanding network vulnerabilities, ......more

Energy Optimization in Wireless Networks

Energy Optimization in Wireless Networks

Energy Optimization in Wireless Networks is a cutting-edge approach aimed at maximizing energy efficiency and prolonging......more

The Active Defender: Immersion in the Offensive Security Mindset

The Active Defender: Immersion in the Offensive Security Mindset

Immerse yourself in the offensive security mindset to better defend against attacks In The Active Defender: Immersion in......more

Secure Social Networking for Private Information

Secure Social Networking for Private Information

In "Networked Lives: Navigating the Online Social Networks," you will learn how to navigate the complexity of OSNs as we......more

The Technology Doesn’t Matter: Prioritizing the People in It Business Alignment

The Technology Doesn’t Matter: Prioritizing the People in It Business Alignment

"In The Technology Doesn’t Matter: Prioritizing the People in IT Business Alignment, veteran IT executive Rachel Lockett......more

An Algorithm for 4g Mobile Network Using Vertical Handoff Approach

An Algorithm for 4g Mobile Network Using Vertical Handoff Approach

Shashank Singh’s ground-breaking book "An Algorithm for 4G Mobile Network Using Vertical Handoff Approach" offers a thor......more

Networks Rising: Thinking Together in a Connected World

Networks Rising: Thinking Together in a Connected World

For the second time in human history, we are on the verge of broad new breakthroughs in health, productivity, and person......more

To study the effect of mass-media, TV, Internet and video games etc. on the psychological development of children

To study the effect of mass-media, TV, Internet and video games etc. on the psychological development of children

To study the effect of mass media TV Internet and video games etc. on the psychological development of children, Mass me......more

Go H*ck Yourself: An Ethical Approach to Cyber Attacks and Defense

Go H*ck Yourself: An Ethical Approach to Cyber Attacks and Defense

Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on introduction to the wor......more

Fault Detection Integrated Sensor Networks

Fault Detection Integrated Sensor Networks

This research focuses on developing effective fault detection techniques for integrated sensor networks. Sensor networks......more

Queuing Theory for IoT Sensor Networks

Queuing Theory for IoT Sensor Networks

The "Queuing Theory for IoT Sensor Networks" explores a fundamental and powerful approach to optimize the performance an......more

Person Authentication Based on Dorsal Hand Veins

Person Authentication Based on Dorsal Hand Veins

This book describes a new method for hand vein recognition using biometrics, which is a method of recognizing a person b......more

Some Security Investigations on Smartphone Platform

Some Security Investigations on Smartphone Platform

In today’s world, smartphones have become an integral part of our lives, and we use them for various purposes such as co......more

Governing in the Age of the Internet

Governing in the Age of the Internet

Over the past thirty years, the Internet has transformed virtually every area of human activity, social and economic. Th......more

QuickBooks Online for Beginners 2022: The Most Current QuickBooks Guide for Small Business Owners

QuickBooks Online for Beginners 2022: The Most Current QuickBooks Guide for Small Business Owners

Do you desire a simple approach to manage your company’s finances but don’t consider yourself to be technically or mathe......more

Augmented Realities: Connecting the Digital and Physical Worlds

Augmented Realities: Connecting the Digital and Physical Worlds

"Augmented Realities: Connecting the Digital and Physical Worlds" is a book by Jonathan Smith. In his book "Augmented Re......more

VR/AR Navigation: Redefining Reality

VR/AR Navigation: Redefining Reality

Virtual reality (VR) and augmented reality (AR) navigation are rapidly evolving fields, and Emily Parker’s "VR/AR Naviga......more

Dark Wire: The Incredible True Story of the Largest Sting Operation in History

Dark Wire: The Incredible True Story of the Largest Sting Operation in History

The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wir......more

The Devsecops Book: How to Deliver at Speed Without Sacrificing Security

The Devsecops Book: How to Deliver at Speed Without Sacrificing Security

A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Secu......more

Zero Trust and Third-Party Risk

Zero Trust and Third-Party Risk

Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third......more

Efficient Channel Assignment Methods for Wireless Regional Area Networks

Efficient Channel Assignment Methods for Wireless Regional Area Networks

The advancement in technology and increasing interest in the various emerging wireless products has lead to the exponent......more

Towards Design and Development of Secure and Privacy-Preserving Frameworks for IOT-enabled Networks

Towards Design and Development of Secure and Privacy-Preserving Frameworks for IOT-enabled Networks

With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is building a network of Int......more

Cyberwire Cybersecurity First Principles

Cyberwire Cybersecurity First Principles

The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chie......more

Reliable Internet of Things Communication and Service Discover

Reliable Internet of Things Communication and Service Discover

The Internet of Things is a many vision one paradigm technology that connects electrical, electronic and non electrical ......more

Fault Diagnosis in Wireless Sensor Networks using Artificial Immune System

Fault Diagnosis in Wireless Sensor Networks using Artificial Immune System

: LUHOHVV VHQVRU QHWZRUNV:61V KDYH EHFRPH SRSXODU ZRUOGZLGH GXH WR WKHLU ZLGH UDQJH RI DSSOLFDWLRQV OLNH IRUHVW ILUH PRQ......more

Optimization Model for Security and Privacy of Internet of Things

Optimization Model for Security and Privacy of Internet of Things

In today’s world, Internet of Things is an attention grabbing area of research. IoT has become popular because of the ev......more

Privacy Preserving Data Storage And Retrieval In Cloud

Privacy Preserving Data Storage And Retrieval In Cloud

The cloud data storage and retrieval-centric CSP represents the client’s environmental-centric encryption approaches to ......more

Virtual Ethics: Navigating Augmented Realities

Virtual Ethics: Navigating Augmented Realities

"Virtual Ethics: Navigating Augmented Realities" is a thought-provoking investigation of the ethical difficulties that d......more

A Study on Outlier Analysis on Security Fraud Detection

A Study on Outlier Analysis on Security Fraud Detection

Fraud Detection has great importance to Financial Institutions. The proposed research work is concerned with the problem......more

The Modem World: A Prehistory of Social Media

The Modem World: A Prehistory of Social Media

The untold story about how the internet became social, and why this matters for its future "A great book for anyone who ......more

Past and Future Presence: Approaches for Implementing Xr Technology in Humanities and Art Education

Past and Future Presence: Approaches for Implementing Xr Technology in Humanities and Art Education

While uses and studies of XR technology within STEM-based education have been plentiful in recent years, there has been ......more

Microsoft Azure for Dummies

Microsoft Azure for Dummies

"Updated to included expanded information on data resources, machine learning, artificial intelligence, and collaboratio......more

Predictors of Problematic Internet Use Among Youth

Predictors of Problematic Internet Use Among Youth

Internet is considered one of the twenty-first century’s greatest human inventions. The term internet was first introduc......more

The Nomadic Workstyle: Embracing Remote Work from Anywhere

The Nomadic Workstyle: Embracing Remote Work from Anywhere

An Overview of the Digital Nomad’s Way of Life The digital nomad lifestyle is on the rise in the modern world because it......more

An Internet in Your Head: A New Paradigm for How the Brain Works

An Internet in Your Head: A New Paradigm for How the Brain Works

  • Ingram,出版日期:2022-09-13

Whether we realize it or not, we think of our brains as computers. In neuroscience, the metaphor of the brain as a compu......more

The Language of Deception: Weaponizing Next Generation AI

The Language of Deception: Weaponizing Next Generation AI

In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin H......more

Software Transparency: Supply Chain Security in an Era of a Software-Driven Society

Software Transparency: Supply Chain Security in an Era of a Software-Driven Society

Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Ch......more

Construction of a Circuit in the Tor Network

Construction of a Circuit in the Tor Network

Construction of a Circuit in the Tor Network is a captivating and timely book that delves into the intriguing world of o......more

71 2 3 4 5 6 7 下一頁 跳到

外文書書籍分類

縮小搜尋範圍

依購買狀態搜尋