Free Delivery Over $100
32863 books were found.
Quantum Cryptography: Securing the Future with Quantum Tech delves into the cutting-edge world of quantum cryptography... Read More >>
It's important to stay up to date on network technology developments. This book will present the most recent and... Read More >>
This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing... Read More >>
Gain a deeper understanding of AWS services by building eight real-world projects Key Features Gain practical... Read More >>
The book provides a detailed examination of the integration of IoT technology into various industries and its impact... Read More >>
Artificial Intelligence and Ethics is a general and wide-ranging survey of the benefits and ethical dilemmas of... Read More >>
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security... Read More >>
Details several interdisciplinary topics, like sustainable development goals for organizational effectiveness in... Read More >>
Your comprehensive guide to succeeding on the UPDATED CCNA Certification exam In the newly revised second edition... Read More >>
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the... Read More >>
Covers important topics in sustainable innovation in business including bitcoin as a global currency, using smart... Read More >>
Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions.... Read More >>
This accessible, comprehensive guide is aimed at students, practitioners, engineers, and users. The emphasis is... Read More >>
Entrepreneurs must stay cutting-edge to make their businesses thrive. This book features a cutting-edge approach... Read More >>
This book is an attitude implementation guide filled with tools, real-world examples and global case studies that... Read More >>
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source... Read More >>
A key step here is to investigate how and why the security breach happened in the first place. The best to do this... Read More >>
The book discusses the issues of building and maintaining a distinctive and credible employer brand and presents... Read More >>
In this context, the book offers readers hopes as well as warnings about how technology can be used for the public... Read More >>
The world of SAP is undergoing a major transformation, with many customers either planning or actively modernizing... Read More >>
Master Linux Shells – Your Complete Guide to Practical Success with Bash, Zsh, PowerShell Key Features Embrace... Read More >>