Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores...Lasīt vairāk
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores...Lasīt vairāk
Space Piracy is a forward-thinking resource that considers, analyzes, and provides solutions to the influence of the ignoble side of humanity in the realm of outer space, where potential for crime, corruption, piracy, and war increases as the...Lasīt vairāk
Space Piracy is a forward-thinking resource that considers, analyzes, and provides solutions to the influence of the ignoble side of humanity in the realm of outer space, where potential for crime, corruption, piracy, and war increases as the...Lasīt vairāk
Understand the history of hacking culture and the genesis of a powerful modern subcultureIn this audiobook, veteran information security professional Emily Crose delivers a deep dive into the history of the United States go...Lasīt vairāk
Understand the history of hacking culture and the genesis of a powerful modern subcultureIn this audiobook, veteran information security professional Emily Crose delivers a deep dive into the history of the United States go...Lasīt vairāk
In Theres No Such Thing as Crypto Crime, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum...Lasīt vairāk
In Theres No Such Thing as Crypto Crime, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum...Lasīt vairāk
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked by Len Noe, a pioneering cyborg with ten microchips implanted in his body, youll find a startlingly insightful...Lasīt vairāk
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked by Len Noe, a pioneering cyborg with ten microchips implanted in his body, youll find a startlingly insightful...Lasīt vairāk
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean prod...Lasīt vairāk
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean prod...Lasīt vairāk
We all keep secretsfrom our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos L...Lasīt vairāk
We all keep secretsfrom our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos L...Lasīt vairāk
We all keep secretsfrom our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos L...Lasīt vairāk
A decade ago, developers built information-sharing software by writing a lot of custom code in a single code base, then adding layers of caching. Now we build information systems: interdependent software and services, data platforms, and event stream...Lasīt vairāk
A decade ago, developers built information-sharing software by writing a lot of custom code in a single code base, then adding layers of caching. Now we build information systems: interdependent software and services, data platforms, and event stream...Lasīt vairāk
A decade ago, developers built information-sharing software by writing a lot of custom code in a single code base, then adding layers of caching. Now we build information systems: interdependent software and services, data platforms, and event stream...Lasīt vairāk
New York Times Bestseller Winner of the National Outdoor Book Award Winner of the Saroyan International Prize for Writing Winner of the Pacific Northwest Book Award The best outdoors book of the year. Sierra Club...Lasīt vairāk
In Israel and the Cyber Threat, Charles D. (Chuck) Freilich, Matthew S. Cohen, and Gabi Siboni provide a detailed and comprehensive study of Israels cyber strategy, tracing it from its origins to the present. They analyze Israels highly ad...Lasīt vairāk
In Israel and the Cyber Threat, Charles D. (Chuck) Freilich, Matthew S. Cohen, and Gabi Siboni provide a detailed and comprehensive study of Israels cyber strategy, tracing it from its origins to the present. They analyze Israels highly ad...Lasīt vairāk
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organizationinhabiting a variety of rol...Lasīt vairāk
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organizationinhabiting a variety of rol...Lasīt vairāk
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organizationinhabiting a variety of rol...Lasīt vairāk
In Israel and the Cyber Threat, Charles D. (Chuck) Freilich, Matthew S. Cohen, and Gabi Siboni provide a detailed and comprehensive study of Israels cyber strategy, tracing it from its origins to the present. They analyze Israels highly ad...Lasīt vairāk
The Enigma cipher was supposed to be the Germans impenetrable defence for its military communications against prying eyes during World War II. All manner of secrets were entrusted to it. When the Allies finally managed to crack the code, it heral...Lasīt vairāk
The Enigma cipher was supposed to be the Germans impenetrable defence for its military communications against prying eyes during World War II. All manner of secrets were entrusted to it. When the Allies finally managed to crack the code, it heral...Lasīt vairāk
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your companys specific needs. Ideal f...Lasīt vairāk
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your companys specific needs. Ideal f...Lasīt vairāk