
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity Author: Gregory J. Falco and Eric Rosenbach Pub...
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity Author: Gregory J. Falco and Eric Rosenbach Pub...
Beginning 3D Game Assets Development Pipeline: Learn to Integrate from Maya to Unity Author: Nova Villanueva Publisher f...
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence,997) 1st ed. 2022 Edition A...
The Technology and Business of Mobile Communications: An Introduction (IEEE Press) Author: Mythri Hunukumbure ,Justin P....
Java Challenges: 100+ Proven Tasks that Will Prepare You for Anything Author: Michael Inden Publisher finelybook 出版社: A...
Advanced Unity Game Development: Build Professional Games with Unity,C#,and Visual Studio Author: Victor G Brusca Publis...
RDBMS In-Depth: Mastering SQL and PL/SQL Concepts,Database Design,ACID Transactions,and Practice Real Implementation of ...
Redis® Deep Dive: Explore Redis – Its Architecture,Data Structures and Modules like Search,JSON,AI,Graph,Timeserie...
The AI Dilemma: A Leadership Guide to Assess Enterprise AI Maturity & Explore AI’s Impact in Your Industry (E...
The Complete Guide for CISA Examination Preparation (Security,Audit and Leadership Series) Author: Richard E. Cascarino ...