зарубежная компьютерная литература
[b]The ultimate study guide for Microsoft 365 Certified Associate (MCA) Modern Desktop certification—covers the new [i]Exam MD-100[/i] and the new [i]Exam MD-101[/i] in one book![/b]
Referred to as the Modern Desktop, Microsoft 365 is Microsoft’s new…
[b]The ultimate study guide for Microsoft 365 Certified Associate (MCA) Modern Desktop certification—covers the new [i]Exam MD-100[/i] and the new [i]Exam MD-101[/i] in one book![/b]
Referred to as the Modern Desktop, Microsoft 365 is Microsoft’s new…
[b]Prepare for success on the challenging CASP+ CAS-004 exam [/b]
In the newly updated Second Edition of [i]CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004[/i], accomplished cybersecurity expert Nadean Tanner delivers an exte…
[b]Prepare for success on the challenging CASP+ CAS-004 exam [/b]
In the newly updated Second Edition of [i]CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004[/i], accomplished cybersecurity expert Nadean Tanner delivers an exte…
[b]CORPORATE CYBERSECURITY[/b] [b]An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs[/b] A bug bounty program is offered by organizations for people to receive recognition and compensation for repor…
[b]CORPORATE CYBERSECURITY[/b] [b]An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs[/b] A bug bounty program is offered by organizations for people to receive recognition and compensation for repor…
[b]Make security a priority on your team[/b]
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every [i]37 seconds. [/i]Since security programs are only as effective as a team’s will…
[b]Make security a priority on your team[/b]
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every [i]37 seconds. [/i]Since security programs are only as effective as a team’s will…
[b]INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes[/b]The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitali…
[b]INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes[/b]The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitali…
[b]Your no-fluff, fast-paced guide to everything Windows 10[/b]
This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tri…
[b]Your no-fluff, fast-paced guide to everything Windows 10[/b]
This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tri…
[b]Assess and improve your networking skillset with proven Sybex practice tests [/b]
In the freshly revised Second Edition of [i]CompTIA Network+ Practice Tests Exam N10-008[/i], IT expert and author Craig Zacker delivers a set of accessible and usef…
[b]Assess and improve your networking skillset with proven Sybex practice tests [/b]
In the freshly revised Second Edition of [i]CompTIA Network+ Practice Tests Exam N10-008[/i], IT expert and author Craig Zacker delivers a set of accessible and usef…
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A…
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A…
[b]CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION[/b] [b]A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field[/b]As technology continues to evolve [i]Cryptography, Informat…
[b]CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION[/b] [b]A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field[/b]As technology continues to evolve [i]Cryptography, Informat…
[b]This Study Guide helps you understand the job role and responsibilities of a Microsoft 365 Teams Administrator. It's your one-stop resource for learning new skills, preparing to take the exam, and boosting your career![/b]
Cloud technology ha…
[b]This Study Guide helps you understand the job role and responsibilities of a Microsoft 365 Teams Administrator. It's your one-stop resource for learning new skills, preparing to take the exam, and boosting your career![/b]
Cloud technology ha…
[b]Learn[/b][b] application security from the very start, with this comprehensive and approachable guide![/b]
[i]Alice and Bob Learn Application Security[/i] is an accessible and thorough resource for anyone seeking to incorporate, from the beginnin…
[b]Learn[/b][b] application security from the very start, with this comprehensive and approachable guide![/b]
[i]Alice and Bob Learn Application Security[/i] is an accessible and thorough resource for anyone seeking to incorporate, from the beginnin…
[b]Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges[/b][i] [/i]
Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and …
[b]Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges[/b][i] [/i]
Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and …
[b]Learn to think like a hacker to secure your own systems and data[/b] Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sens…
[b]Learn to think like a hacker to secure your own systems and data[/b] Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sens…
[b]EXAM MD-100 AND MD-101[/b] Provides 1,000 practice questions covering all exam objectives. Compliments the [i]MCA Modern Desktop Administrator Complete Study Guide: Exam MD-100[/i] and [i]Exam MD-101[/i] [b]Quick, focused review for MD-100 and MD-…
[b]EXAM MD-100 AND MD-101[/b] Provides 1,000 practice questions covering all exam objectives. Compliments the [i]MCA Modern Desktop Administrator Complete Study Guide: Exam MD-100[/i] and [i]Exam MD-101[/i] [b]Quick, focused review for MD-100 and MD-…
[i]MCA Microsoft Office Specialist Study Guide: [i]PowerPoint Associate Exam MO-300[/i] [/i]is your roadmap to preparing for taking the MO-300 exam and earning the PowerPoint Associate (PowerPoint and PowerPoint 2019) certification. The following obj…
[i]MCA Microsoft Office Specialist Study Guide: [i]PowerPoint Associate Exam MO-300[/i] [/i]is your roadmap to preparing for taking the MO-300 exam and earning the PowerPoint Associate (PowerPoint and PowerPoint 2019) certification. The following obj…
[b]Cybersecurity Risk Management[/b] In [i]Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework[/i], veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, …
[b]Cybersecurity Risk Management[/b] In [i]Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework[/i], veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, …
[b]CISSP Study Guide – fully updated for the 2021 CISSP Body of Knowledge [/b]
[i](ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition[/i] has been completely updated based on the latest 2021 CISSP Exam…
[b]CISSP Study Guide – fully updated for the 2021 CISSP Body of Knowledge [/b]
[i](ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition[/i] has been completely updated based on the latest 2021 CISSP Exam…
[b]Need Windows help? Find the latest tips and tricks in this perennial favorite on Windows[/b] Windows 11 promises to be the fastest, most secure, and most flexible version of the Microsoft operating system yet. With a promise like that, of course y…
[b]Need Windows help? Find the latest tips and tricks in this perennial favorite on Windows[/b] Windows 11 promises to be the fastest, most secure, and most flexible version of the Microsoft operating system yet. With a promise like that, of course y…
[b]The proven Study Guide that prepares you for this new Google Cloud exam[/b]
The [i]Google Cloud Certified Professional Data Engineer Study Guide[/i], provides everything you need to prepare for this important exam and master the skills necessary t…
[b]The proven Study Guide that prepares you for this new Google Cloud exam[/b]
The [i]Google Cloud Certified Professional Data Engineer Study Guide[/i], provides everything you need to prepare for this important exam and master the skills necessary t…
[b]Unlock the potential of macOS Monterey with this updated guide from «Dr. Mac» himself[/b]
Macs are famously an absolute pleasure to use. But it's even more fun discovering all the cool things a new version of macOS can do. macOS Monterey, int…
[b]Unlock the potential of macOS Monterey with this updated guide from «Dr. Mac» himself[/b]
Macs are famously an absolute pleasure to use. But it's even more fun discovering all the cool things a new version of macOS can do. macOS Monterey, int…