bannerbanner

зарубежная компьютерная литература

Intelligent Network Management and Control
5
[b]The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at all stages.[/b] Intelligent Network Management and Control deals with topical issues related mainly to intelligent security of…
[b]The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at all stages.[/b] Intelligent Network Management and Control deals with topical issues related mainly to intelligent security of…
The Official (ISC)2 CCSP CBK Reference
5
[b]The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated.[/b] Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and…
[b]The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated.[/b] Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and…
Google Cloud Certified Professional Cloud Architect Study Guide
3
[b]An indispensable guide to the newest version of the Google Certified Professional Cloud Architect certification[/b] The newly revised Second Edition of the [i]Google Cloud Certified Professional Cloud Architect Study Guide[/i] delivers a proven an…
[b]An indispensable guide to the newest version of the Google Certified Professional Cloud Architect certification[/b] The newly revised Second Edition of the [i]Google Cloud Certified Professional Cloud Architect Study Guide[/i] delivers a proven an…
Linux Security Fundamentals
3
[i]Linux Security Fundamentals[/i] provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing …
[i]Linux Security Fundamentals[/i] provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing …
Cybersecurity For Dummies
3
[b]Explore the latest developments in cybersecurity with this essential guide[/b] Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is t…
[b]Explore the latest developments in cybersecurity with this essential guide[/b] Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is t…
CCNA Certification Study Guide, Volume 2
4
[b]Cisco expert Todd Lammle prepares you for the NEW Cisco CCNA certification exam![/b] Cisco, the world leader in network technologies, has released the new Cisco Certified Network Associate (CCNA) exam. This consolidated certification exam tests a …
[b]Cisco expert Todd Lammle prepares you for the NEW Cisco CCNA certification exam![/b] Cisco, the world leader in network technologies, has released the new Cisco Certified Network Associate (CCNA) exam. This consolidated certification exam tests a …
Linux Bible
4
[b]The industry favorite Linux guide[/b] [i]Linux Bible, 10th Edition[/i] is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. this updated tenth edition covers the latest v…
[b]The industry favorite Linux guide[/b] [i]Linux Bible, 10th Edition[/i] is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. this updated tenth edition covers the latest v…
MCA Modern Desktop Administrator Complete Study Guide
5
[b]The ultimate study guide for Microsoft 365 Certified Associate (MCA) Modern Desktop certification—covers the new [i]Exam MD-100[/i] and the new [i]Exam MD-101[/i] in one book![/b] Referred to as the Modern Desktop, Microsoft 365 is Microsoft’s new…
[b]The ultimate study guide for Microsoft 365 Certified Associate (MCA) Modern Desktop certification—covers the new [i]Exam MD-100[/i] and the new [i]Exam MD-101[/i] in one book![/b] Referred to as the Modern Desktop, Microsoft 365 is Microsoft’s new…
CASP+ CompTIA Advanced Security Practitioner Practice Tests
4
[b]Prepare for success on the challenging CASP+ CAS-004 exam [/b] In the newly updated Second Edition of [i]CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004[/i], accomplished cybersecurity expert Nadean Tanner delivers an exte…
[b]Prepare for success on the challenging CASP+ CAS-004 exam [/b] In the newly updated Second Edition of [i]CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004[/i], accomplished cybersecurity expert Nadean Tanner delivers an exte…
Corporate Cybersecurity
5
[b]CORPORATE CYBERSECURITY[/b] [b]An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs[/b] A bug bounty program is offered by organizations for people to receive recognition and compensation for repor…
[b]CORPORATE CYBERSECURITY[/b] [b]An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs[/b] A bug bounty program is offered by organizations for people to receive recognition and compensation for repor…
Security Awareness For Dummies
4
[b]Make security a priority on your team[/b]  Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every [i]37 seconds. [/i]Since security programs are only as effective as a team’s will…
[b]Make security a priority on your team[/b]  Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every [i]37 seconds. [/i]Since security programs are only as effective as a team’s will…
Cultural Commons in the Digital Ecosystem
5
[b]INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes[/b]The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitali…
[b]INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes[/b]The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitali…
Windows 10 Portable Genius
3
[b]Your no-fluff, fast-paced guide to everything Windows 10[/b] This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tri…
[b]Your no-fluff, fast-paced guide to everything Windows 10[/b] This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tri…
CompTIA Network+ Practice Tests
4
[b]Assess and improve your networking skillset with proven Sybex practice tests [/b] In the freshly revised Second Edition of [i]CompTIA Network+ Practice Tests Exam N10-008[/i], IT expert and author Craig Zacker delivers a set of accessible and usef…
[b]Assess and improve your networking skillset with proven Sybex practice tests [/b] In the freshly revised Second Edition of [i]CompTIA Network+ Practice Tests Exam N10-008[/i], IT expert and author Craig Zacker delivers a set of accessible and usef…
Cybersecurity in Smart Homes
3
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A…
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A…
Cryptography, Information Theory, and Error-Correction
5
[b]CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION[/b] [b]A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field[/b]As technology continues to evolve [i]Cryptography, Informat…
[b]CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION[/b] [b]A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field[/b]As technology continues to evolve [i]Cryptography, Informat…
MCA Microsoft 365 Teams Administrator Study Guide
4
[b]This Study Guide helps you understand the job role and responsibilities of a Microsoft 365 Teams Administrator. It's your one-stop resource for learning new skills, preparing to take the exam, and boosting your career![/b] Cloud technology ha…
[b]This Study Guide helps you understand the job role and responsibilities of a Microsoft 365 Teams Administrator. It's your one-stop resource for learning new skills, preparing to take the exam, and boosting your career![/b] Cloud technology ha…
Alice and Bob Learn Application Security
4
[b]Learn[/b][b] application security from the very start, with this comprehensive and approachable guide![/b]  [i]Alice and Bob Learn Application Security[/i] is an accessible and thorough resource for anyone seeking to incorporate, from the beginnin…
[b]Learn[/b][b] application security from the very start, with this comprehensive and approachable guide![/b]  [i]Alice and Bob Learn Application Security[/i] is an accessible and thorough resource for anyone seeking to incorporate, from the beginnin…
The Digital Big Bang
4
[b]Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges[/b][i] [/i] Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and …
[b]Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges[/b][i] [/i] Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and …
Hacking For Dummies
5
[b]Learn to think like a hacker to secure your own systems and data[/b] Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sens…
[b]Learn to think like a hacker to secure your own systems and data[/b] Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sens…

Популярные авторы