
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...
IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing Author:by Lewis Heuermann (Author) Pu...
From Encryption to Quantum Computing: The Governance of Information Security and Human Rights (Information Technology an...
Google Machine Learning and Generative AI for Solutions Architects: Build efficient and scalable AI/ML solutions on Goog...
Core Java, Volume II: Advanced Features (Oracle Press for Java) Author:by Cay Horstmann (Author) Publisher finelybook 出版...
Introduction to Analysis: Theorems and Examples (Synthesis Lectures on Mathematics & Statistics) Author:by Hidefumi...
Visualization for Artificial Intelligence (Synthesis Lectures on Visualization) Author:by Shixia Liu (Author), Weikai Ya...
Microsoft Power BI Performance Best Practices: Learn practical techniques for building high-speed Power BI solutions Aut...
Adopting AI for Business Transformation: Complete guide to harness AI to stay competitive and future proof (English Edit...
Distributed Intelligence: Building an autonomous tech ecosystem with AI, blockchain, IoT and green energy (English Editi...