Free Delivery Over $100
22456 books were found.
Create automated security policies for Palo Alto Networks firewalls that transform manual processes into scalable,... Read More >>
Are your n8n workflows safe when a dependency shifts at 2 a.m.? Will your logs surface exfiltration before customers... Read More >>
Read More >>
The aim of this guide: to give order to the chaos of AI that is being unleashed on the world. Read More >>
In today's interconnected digital society, the protection of information is not just a technical requirement but... Read More >>
Gray Hat C# Programming: Practical Techniques for Creating Security Tools, Automating Tasks, and Enhancing Penetration... Read More >>
Wenn Biologie auf Code trifft, betritt die Menschheit eine neue Grenze von Macht - und Gefahr. Das 21. Jahrhundert... Read More >>
Unlock the core techniques of modern software exploitation - from buffer overflows to return-oriented programming... Read More >>
OSINT for Beginners: Gather and Analyze Online Information Step by Step Practical Techniques for Digital Investigations,... Read More >>
Quand la biologie rencontre le code, l'humanité entre dans une nouvelle ère de puissance - et de péril. Le 21e... Read More >>
This is the fourth book in Microsoft Purview 2025 series and covers the privacy section of Microsoft Purview. Who... Read More >>
Quando a biologia encontra o código, a humanidade entra em uma nova fronteira de poder - e de perigo. O século... Read More >>
Quando la biologia incontra il codice, l'umanità entra in una nuova frontiera di potere - e di pericolo. Il XXI... Read More >>
Calm Tech Parenting gives busy families a simple, friendly way to manage screens, teach online safety, and build... Read More >>
The Baofeng Radio User Guide is a practical companion for anyone who wants to turn a compact handheld radio into... Read More >>
Gray Hat Coding with C#: Building Exploits, Malware, and Security Tools with .NET C# is no longer just a language... Read More >>
In today's rapidly evolving AI landscape, security is no longer optional-it is mission-critical. AI Security Mastery:... Read More >>
Rust Hacking for Black Hats: Build Advanced Malware, Network Exploits, and Red Team Tools with Rust Programming... Read More >>
Are you ready to become a cyber hero? Step into the world of cybersecurity, ethical hacking, and tech mastery with... Read More >>
This is the second book in the Microsoft Purview series. The book's main focus is on Microsoft Purview Risk & Compliance... Read More >>
CONFORMITÉ ISO 27001: STRATÉGIE POUR LA GESTION DES RISQUES ET LA CERTIFICATION Guide pratique des clauses de... Read More >>
This book describes and explains a number of simple cryptographic methods and techniques. Eash section gives some... Read More >>
In an age where almost everything is digital, so too are the criminals who seek to exploit it. Breaking the Bank:... Read More >>
Is your AI a privacy nightmare waiting to happen? In the gold rush for artificial intelligence, user data is the... Read More >>