Tags - computer technology
Flow Architectures: The Future of Streaming and Event-Driven Integration
Red Hat RHCSA 8 Cert Guide: EX200 (Certification Guide), 2nd Edition
Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore
The Future of Tech Is Female: How to Achieve Gender Diversity
Science Fiction (The MIT Press Essential Knowledge series)
Artificial Intelligence: The Insights You Need from Harvard Business Review (HBR Insights Series)
Artificial Intelligence: The Insights You Need from Harvard Business Review (HBR Insights Series)
Python for Algorithmic Trading: From Idea to Cloud Deployment
Python and Algorithmic Thinking for the Complete Beginner: Learn to Think Like a Programmer (2nd Edition)
Making Games: The Politics and Poetics of Game Creation Tools (Playful Thinking)
Kotlin Blueprints
Programming Kotlin Applications: Building Mobile and Server-Side Applications with Kotlin
Learn Robotics Programming (2nd Edition)
Hop, Skip, Go: How the Mobility Revolution Is Transforming Our Lives
The End of Money
Photoshop数码照片处理高手之道 人像篇: Photoshop (Portrait) : The Guide From Beginner to Expert
画笔圣经Photoshop专业绘画技法
Adobe Camera Raw完全自学教程
E-encyclopedia
Cybersecurity for Everyone
The Complete Idiot's Guide to Graphic Design: Turn Your Creative Ideas into Professional-Looking Design
Adobe Photoshop: A Complete Course and Compendium of Features (Course and Compendium)
포토샵 & 일러스트레이터 CC 2019 무작정 따라하기
포토샵 & 프리미어프로 CC 2019 무작정 따라하기
일러스트레이터 CC 2019 무작정 따라하기
포토샵 CC 2019 무작정 따라하기
HTML+CSS+JavaScript网页设计从入门到精通
Office 2010 Bible (3rd Edition)
Office 2010 Library: Excel 2010 Bible, Access 2010 Bible, PowerPoint 2010 Bible, Word 2010 Bible (Bible)
Teach Yourself VISUALLY Windows 7 (Teach Yourself VISUALLY (Tech))
Mastering Microsoft SharePoint Foundation 2010
Kubeflow Operations Guide: Managing Cloud and On-Premise Deployment
97 Things Every SRE Should Know
97 Things Every Cloud Engineer Should Know
Practical Fairness: Achieving Fair and Secure Data Models
Code as Creative Medium: A Handbook for Computational Art and Design
Scripting with Objects: A Comparative Presentation of Object-Oriented Scripting with Perl and Python
Domain-Driven Design Distilled
Developing Games on the Raspberry Pi: App Programming with Lua and LÖVE
Developing Games on the Raspberry Pi: App Programming with Lua and LÖVE
The NES Encyclopedia: Every Game Released for the Nintendo Entertainment System
PCWorld (February 2021)
User Experience Mapping
.NET 4.0 Generics: Beginner's Guide
.NET 4.5 Parallel Extensions Cookbook
.NET Core 2.0 By Example
.NET Compact Framework 3.5 Data Driven Applications
3D Graphics with XNA Game Studio 4.0
.NET Standard 2.0 Cookbook
Fixing Bad UX Designs: Master proven approaches, tools, and techniques to make your user experience great again
Learning Axure RP Interactive Prototypes
Axure RP 6 Prototyping Essentials
Machine Learning with R (3rd Edition)
Reverse Engineering Code with IDA Pro
Learning Blender: A Hands-On Guide to Creating 3D Animated Characters (Learning) (2nd Edition)
Learning Regular Expressions (Learning)
Managing Information Security
12 Essential Skills for Software Architects
Digital Forensics and Incident Response: Incident Response Techniques and Procedures to Respond to Modern Cyber Threats (2nd Edition)
Mobile Forensics Cookbook
Windows Forensics Cookbook
Seven Deadliest Wireless Technologies Attacks
Digital Forensics with Kali Linux (2nd Edition)
CISSP Study Guide
Seven Deadliest Network Attacks
Seven Deadliest Network Attacks
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 (3rd Edition)
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Federated Identity Primer
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Cloud Storage Forensics
Managing Information Security (2nd Edition)
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Cyber Reconnaissance, Surveillance and Defense
Building an Intelligence-Led Security Program
Introduction to Information Security: A Strategic-Based Approach
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies
Smart Grid Security: Innovative Solutions for a Modernized Grid
Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
Operating System Forensics
Mobile Data Loss: Threats and Countermeasures
Cyber Security Awareness for CEOs and Management
Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity
Essential Skills for Hackers
Operating System Forensics
PCI DSS 3.1: The Standard That Killed SSL
Securing Social Media in the Enterprise
You: For Sale: Protecting Your Personal Data and Privacy Online
Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity
Deploying Secure Containers for Training and Development
Cyber Guerilla
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
Thor's OS Xodus: Why And How I Left Windows For OS X
Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations
Automating Open Source Intelligence: Algorithms for OSINT
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity
Mobile Security and Privacy: Advances, Challenges and Future Research Directions
Mobile Data Loss: Threats and Countermeasures
Thor's OS Xodus: Why And How I Left Windows For OS X
Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments
Mobile Security and Privacy: Advances, Challenges and Future Research Directions
Essential Skills for Hackers
Automating Open Source Intelligence: Algorithms for OSINT
Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications
Infosec Management Fundamentals
Meeting People via WiFi and Bluetooth