排序依

共有2519

Shit to Remember: Internet Address and Password Keeper to Prevent Wtf Moments

Shit to Remember: Internet Address and Password Keeper to Prevent Wtf Moments

Never forget a f*cking password again with this password keeper and internet address book! Sh*t to Remember is the absol......more

The Personal Internet Address & Password Logbook

The Personal Internet Address & Password Logbook

Tired of losing track of the websites you visit (whether frequently or infrequently), along with all those usernames and......more

Troll

Troll

Scotty is no stranger to being bullied, but after a chance encounter in an online chatroom, he finds hope in Rebecca. Sc......more

IP Subnetting for Beginners: Your Complete Guide to Master IP Subnetting in 4 Simple Steps

IP Subnetting for Beginners: Your Complete Guide to Master IP Subnetting in 4 Simple Steps

Learn IP Subnetting in just 4 simple steps! If you want to know everything about IP Subnetting and how the Internet work......more

Wtf Is My Password: Password keeper book

Wtf Is My Password: Password keeper book

Password & Internet keeper / Log Book This Password book keeps all your passwords safe and organized alphabetically so y......more

Small Business Cybersecurity Planning: An Owner’s Step-by-Step Guide to Reducing Your Online Risk

Small Business Cybersecurity Planning: An Owner’s Step-by-Step Guide to Reducing Your Online Risk

Unless you are scaling your business fast, Small Businesses are more susceptible to cybersecurity threats. You have fewe......more

The Sandbox Coin: The SAND ERC-20 Utility Token on the Ethereum Blockchain

The Sandbox Coin: The SAND ERC-20 Utility Token on the Ethereum Blockchain

The Sandbox is a metaverse built on a blockchain focused on the world of games. The Sandbox platform allows developers t......more

Assistants Virtual: The Complete Guide to Identifying, Selecting, and Using Virtual Assistants

Assistants Virtual: The Complete Guide to Identifying, Selecting, and Using Virtual Assistants

Does your business run you, or are you running your business? The book Virtual Assistant Assistant is perfect for busine......more

Online Traffic & Advertisements: Take Off Online

Online Traffic & Advertisements: Take Off Online

One strategy to draw some attention to the website when launching an internet business at a low startup cost is through ......more

Micropolis BBS Primer

Micropolis BBS Primer

There was a time before the Internet. It was a time of point-to-point connections via dial-up telephone lines. Computer ......more

The Little Computer Help Book

The Little Computer Help Book

Help for the Technology Shy! If you are looking for a gentle, easy and fun to read computer help book, you have found it......more

Verified: How to Think Straight, Get Duped Less, and Make Better Decisions about What to Believe Online

Verified: How to Think Straight, Get Duped Less, and Make Better Decisions about What to Believe Online

An indispensable guide for telling fact from fiction on the internet--often in less than 30 seconds. The internet brings......more

What Exactly is Virtual Reality?

What Exactly is Virtual Reality?

Virtual Reality has been around for years, but it is only now starting to become mainstream. It’s important for everyone......more

Security Team Operating System

Security Team Operating System

Have you felt the pressure of leading an information security program? The board of directors and executives have questi......more

Ham Radio Handbook: Baofeng Basics for Beginners

Ham Radio Handbook: Baofeng Basics for Beginners

Embark on a Radio Adventure: Dive into the World of Baofeng Imagine stepping into a world where the airwaves open up a g......more

Smart Boundaries: Safe Children - A Parent’s Handbook

Smart Boundaries: Safe Children - A Parent’s Handbook

Shaping a World of Respect: Guarding the Innocence of Youth Embark on a transformative journey with "Smart Boundaries: S......more

Sos! the Technology Guidebook for Parents of Tweens and Teens: Get the Answers You Need, Keep Them Safe and Enjoy Your Kids Again

Sos! the Technology Guidebook for Parents of Tweens and Teens: Get the Answers You Need, Keep Them Safe and Enjoy Your Kids Again

SOS! The Technology Guidebook for Parents of Tweens and Teens equips parents with unique solutions and collaborative too......more

The Big Bucks

The Big Bucks

It’s 1985. For Janet, Dan, Matt, and Cassie, the internet is just some academic thing in universities. They’re engineers......more

Read Write Own: Building the Next Era of the Internet

Read Write Own: Building the Next Era of the Internet

NEW YORK TIMES BESTSELLER - A potent exploration of the power of blockchains to reshape the future of the internet--and ......more

Church Privacy Who Cares? You!: Simple Ways Anyone Can Feed the Flocks, Starve Risks, and Ditch Liabilities

Church Privacy Who Cares? You!: Simple Ways Anyone Can Feed the Flocks, Starve Risks, and Ditch Liabilities

In today’s digital age, privacy is a precious commodity that even the most sacred spaces must vigilantly protect. Church......more

Shadow Codes: The Master Spy of the Digital Age

Shadow Codes: The Master Spy of the Digital Age

Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored f......more

Beyond the Code Navigating the AI Frontier Inside: Virtual Horizons in Our Daily Lives

Beyond the Code Navigating the AI Frontier Inside: Virtual Horizons in Our Daily Lives

Dive into the digital age with "Beyond the Code: Navigating the AI Frontier - Virtual Horizons in Our Daily Lives," a re......more

Dawn of Distrust: Technological Threads Weaving a Trustless Society

Dawn of Distrust: Technological Threads Weaving a Trustless Society

In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future......more

Simulation Theory for Beginners: Evaluating the Simulation Hypothesis and Its Virtual Reality Matrix

Simulation Theory for Beginners: Evaluating the Simulation Hypothesis and Its Virtual Reality Matrix

Simulation Theory for Beginners provides an accessible introduction to the controversial notion that reality as we know ......more

Creative Alchemy: Unleashing Generative AI’s Artistic Potential

Creative Alchemy: Unleashing Generative AI’s Artistic Potential

Step into a world where art meets artificial intelligence, imagination merges with algorithms, and creativity knows no b......more

The Digital Shield: AI in Cyber Defense

The Digital Shield: AI in Cyber Defense

Protect the Digital Frontier with AI In an age where cyber threats lurk behind every corner of the internet, safeguardin......more

The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning

The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning

An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it--and explain......more

The History of the Internet in Byte-Sized Chunks

The History of the Internet in Byte-Sized Chunks

A fascinating, accessible and expertly written introduction to the most important invention in human history. The intern......more

Introduction to Computer Networks 2nd Edition

Introduction to Computer Networks 2nd Edition

Computer Networks is a core subject which explains how a computer connects with other computers. TCP/IP protocol suite i......more

Where Cross-Border Payments Fail: Examining the Friction Facing Global Transfers

Where Cross-Border Payments Fail: Examining the Friction Facing Global Transfers

Embark on a riveting exploration into the heart of global finance with "Where Cross-Border Payments Fail: The Need for R......more

Digital Marketing Mastery: Strategies and Techniques for Business Growth

Digital Marketing Mastery: Strategies and Techniques for Business Growth

Digital Marketing Mastery is a comprehensive guide that equips businesses with the knowledge and tools they need to thri......more

The CIA Guide to Surveillance and Surveillance Detection: The Ultimate Guide to Surreptitious Observation

The CIA Guide to Surveillance and Surveillance Detection: The Ultimate Guide to Surreptitious Observation

"From former CIA counterterrorism officer John C. Kiriakou, Surveillance and Surveillance Detection: A CIA Insider’s Gui......more

Simulation Theory for Beginners: Evaluating the Simulation Hypothesis and Its Virtual Reality Matrix

Simulation Theory for Beginners: Evaluating the Simulation Hypothesis and Its Virtual Reality Matrix

What if everything you know and experience is nothing more than an incredibly sophisticated computer simulation? This fa......more

Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World

Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World

Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital Realm In today’s rapidly ......more

AI in Human Terms

AI in Human Terms

HOW DID AI SEEM TO ARRIVE SO QUICKLY? HOW DO WE MAKE SENSE OUT OF IT? While at times it feels AI arrived in just a matte......more

The Early Internet: Collected Articles

The Early Internet: Collected Articles

Celebrating an Important Woman in ICANN’s History Excerpts of Tamar Frankel’s Remarks A View of Cooperative Competition ......more

Android Phones for Seniors in Easy Steps: Illustrated Using Android 13

Android Phones for Seniors in Easy Steps: Illustrated Using Android 13

Android phones continue to be the most popular smartphones around the world, combining power, efficiency and the compreh......more

Privacy in the Digital Age: Digital Communication and Personal Data

Privacy in the Digital Age: Digital Communication and Personal Data

  • Ingram,出版日期:2023-02-21

With the transition to the information age, a large amount of personal data has begun to be collected through technology......more

The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes

The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes

Cybercriminals can ruin your life-this book teaches you to stop them before they can. Cybercrime is on the rise. Our inf......more

Complete Guide to Building an Information Security Program

Complete Guide to Building an Information Security Program

Many organizations today are required to have a formal IT Security Program in place in order to do business with their c......more

Program or Be Programmed: Ten Commandments for a Digital Age

Program or Be Programmed: Ten Commandments for a Digital Age

  • Ingram,出版日期:2024-10-01

A deep dive into one of this century’s most potent questions: do we direct technology, or do we let ourselves be directe......more

From Gutenberg to Google: The History of Our Future

From Gutenberg to Google: The History of Our Future

Former FCC chairman Wheeler brings to life the two great network revolutions, the invention of the movable-type printing......more

Apple Vision Pro: Tips and Tricks for Spatial Computing (The Ultimate Complete Step by Step Manual to Unlock Hidden Features)

Apple Vision Pro: Tips and Tricks for Spatial Computing (The Ultimate Complete Step by Step Manual to Unlock Hidden Features)

If you’ve newly bought a macbook air, you’ll surely be excited. And you should be. The macbook air is one of the most po......more

Cloud Computing: A Brief Introduction to Cloud Computing (The Ultimate Guide to Amazon Web Services - Cloud Computing)

Cloud Computing: A Brief Introduction to Cloud Computing (The Ultimate Guide to Amazon Web Services - Cloud Computing)

This is a short book on purpose. I don’t want to overwhelm you with technical detail. I go slow and easy, so you can bui......more

Prepping: Natural Disasters, Nuclear Wars and the End of the World (An Essential Survival Guide for Diy Preppers Who Want to Be

Prepping: Natural Disasters, Nuclear Wars and the End of the World (An Essential Survival Guide for Diy Preppers Who Want to Be

Millions of people each year find out the hard way that prepping is a necessary part of life. It can be overwhelming if ......more

App Development: App Programming and Development for Beginners (The Quick Way to Learn App Development and Blogging)

App Development: App Programming and Development for Beginners (The Quick Way to Learn App Development and Blogging)

The quick and simple way to learn app development for beginner’s So, you have decided that you’d like to develop apps fo......more

Ethical Hacking: Learn About Effective Strategies of Ethical Hacking (A Complete Beginners Guide to Successful Ethical Hacking Career)

Ethical Hacking: Learn About Effective Strategies of Ethical Hacking (A Complete Beginners Guide to Successful Ethical Hacking Career)

Do you feel that informatics is indispensable in today’s increasingly digital world? Do you want to introduce yourself t......more

The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment

The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment

"The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment" is a crucial manual ......more

Beyond the Code Navigating the AI Frontier Inside: Virtual Horizons in Our Daily Lives

Beyond the Code Navigating the AI Frontier Inside: Virtual Horizons in Our Daily Lives

Dive into the digital age with "Beyond the Code: Navigating the AI Frontier - Virtual Horizons in Our Daily Lives," a re......more

Beyond the Jumbotron: New Way to Create Consumer Engagements

Beyond the Jumbotron: New Way to Create Consumer Engagements

A simple guidebook for navigating the new world of sports marketing and brand management The modern consumer, today’s fa......more

The Dark Web: The Unseen Side of the Internet

The Dark Web: The Unseen Side of the Internet

The Most Up to Date Book on Dark Web & Dark Net. You must read this book if you want to learn about or embark on the dar......more

Digital Hell: The Inner Workings of a

Digital Hell: The Inner Workings of a "Like"

"The Dark Cloud is the searing exposé of the immense toll the "cloud" takes on our environment. A simple "like" sent fro......more

How to Stay Safe Online: A Digital Self-Care Toolkit for Developing Resilience and Allyship

How to Stay Safe Online: A Digital Self-Care Toolkit for Developing Resilience and Allyship

A powerful, comprehensive guide for digital self-care and allyship from a leading activist for online equality Digital s......more

Scam!: How to Avoid the Scams That Cost Victims Billions of Dollars Every Year

Scam!: How to Avoid the Scams That Cost Victims Billions of Dollars Every Year

Does this sound familiar? "This call is to inform you about an arrest warrant filed under your name. Please call us back......more

ITIL 4 Foundation Exam Preparation & Practice Test: Beginners Guide for Passing the ITIL 4 Exam Fast Including 50 Test Questions

ITIL 4 Foundation Exam Preparation & Practice Test: Beginners Guide for Passing the ITIL 4 Exam Fast Including 50 Test Questions

If you want to discover how to PASS THE ITIL4 EXAM for first attempt, this book is for you! ITIL stands for Information ......more

Cissp: Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security Profession

Cissp: Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security Profession

The book includes additional information on difficult topics as the beginners should have a proper foundation. Cissp is ......more

Counter-Dancing Digitality: On Commoning and Computation

Counter-Dancing Digitality: On Commoning and Computation

Digitality is imposed upon us! To change this, we should not turn away from it, but look carefully into its transformati......more

The Freelancer’s Guide to Lifelong Learning

The Freelancer’s Guide to Lifelong Learning

For self-employed individuals negotiating the ever-changing gig economy, Ayaan Khurana’s "The Freelancer’s Guide to Life......more

Web3: Charting the Internet’s Next Economic and Cultural Frontier

Web3: Charting the Internet’s Next Economic and Cultural Frontier

A WALL STREET JOURNAL AND GLOBE AND MAIL BESTSELLER An essential introduction and guide to navigating the next Internet ......more

Navigating the Metaverse: A Guide to Limitless Possibilities in a Web 3.0 World

Navigating the Metaverse: A Guide to Limitless Possibilities in a Web 3.0 World

Jump into the metaverse to connect with consumers and explore endless opportunities Like the Internet before it, the met......more

Protect Your Practice: Basic Cybersecurity for Healthcare, Legal and Financial Professionals

Protect Your Practice: Basic Cybersecurity for Healthcare, Legal and Financial Professionals

Protect Your Practice incorporates the advice in Protect Your Business and adds specific guidance for the professions, e......more

Protect Your Business: A Small Business Guide to Basic Cybersecurity

Protect Your Business: A Small Business Guide to Basic Cybersecurity

Though it takes years of training to become a cybersecurity professional, anyone can take the prudent steps that make th......more

Bug Bytes

Bug Bytes

We live in a world that is filled with misinformation and disinformation. In our precarious digital environment, the nee......more

Safer @ Home with pfSense(R)

Safer @ Home with pfSense(R)

You no longer need to risk your security and privacy on consumer-grade security products. Book Description pfSense(R) is......more

Cost Savvy Secure Cloud

Cost Savvy Secure Cloud

In "Cost Savvy Secure Cloud," author Preity Gupta challenges the misconception that security is solely a technological i......more

Hidden Traps of the Internet: Building and Protecting Your Online Platform

Hidden Traps of the Internet: Building and Protecting Your Online Platform

Building an online platform is an overwhelming and daunting task, with many pitfalls and horror stories surrounding the ......more

The Metaverse: Gain Insight Into The Exciting Future of the Internet

The Metaverse: Gain Insight Into The Exciting Future of the Internet

What is the Metaverse, exactly? Why is everyone going nuts over this? Why has it become such a fascination in the digita......more

Cybersecurity Simplified: A Guide for Beginners, Students, and Job Seekers

Cybersecurity Simplified: A Guide for Beginners, Students, and Job Seekers

In today’s interconnected world, cybersecurity is no longer optional-it’s a necessity. Cybersecurity Simplified offers a......more

Step Into the Metaverse: How the Immersive Internet Will Rewrite How the World Operates

Step Into the Metaverse: How the Immersive Internet Will Rewrite How the World Operates

In Step into the Metaverse: How the Immersive Internet Will Unlock a Trillion-Dollar Social Economy, future tech strateg......more

The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning

The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning

A history of the internet, uncovering its origins in nature and centuries-old dreams of improving the quality of human l......more

Wasting Time on the Internet

Wasting Time on the Internet

Using clear, readable prose, conceptual artist and poet Kenneth Goldsmith s manifesto shows how our time on the internet......more

Digital Marketing Mastery: Strategies and Techniques for Business Growth

Digital Marketing Mastery: Strategies and Techniques for Business Growth

Digital Marketing Mastery is a comprehensive guide that equips businesses with the knowledge and tools they need to thri......more

Metaverse: The New Digital Revolution. A Beginner’s Guide to Investing in the Digital Arts of the Future, Nft, Blockchain Gaming

Metaverse: The New Digital Revolution. A Beginner’s Guide to Investing in the Digital Arts of the Future, Nft, Blockchain Gaming

Have you heard of the Metaverse?Is it possible to make money with the Metaverse?If I’ve piqued your curiosity, then keep......more

Use of Virtual Machines in Information Systems

Use of Virtual Machines in Information Systems

Virtual machines offer a valuable tool for developing and managing information systems, allowing for more efficient and ......more

AI Powered Data Privacy & Data Protection For Small Businesses

AI Powered Data Privacy & Data Protection For Small Businesses

AI-powered Data Compliance for Small Businesses is an essential guide for entrepreneurs and small business owners who wa......more

The First Days Of The Internet: punk, art and the world wide web

The First Days Of The Internet: punk, art and the world wide web

A memoir of how a boy went from punk rock in the 1970s to art school in the 1980s to inventing parts of the Internet in ......more

Txting 2 Talking: Disconnect to Reconnect

Txting 2 Talking: Disconnect to Reconnect

In a world where our phones can be used for anything, from checking the weather to finding a drug store, we have found o......more

261 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類