
Social Engineering in Cybersecurity: Threats and Defenses
Social Engineering in Cybersecurity: Threats and Defenses Author: Gururaj H L (Editor), Janhavi V (Editor), Ambika V (Ed...

Social Engineering in Cybersecurity: Threats and Defenses Author: Gururaj H L (Editor), Janhavi V (Editor), Ambika V (Ed...

Hands-On Python for DevOps: Leverage Python's native libraries to streamline your workflow and save time with automation...

Hands-On Visual Studio 2022 - Second Edition: A developer's guide to new features and best practices with .NET 8 and VS ...

Azure Data Factory Cookbook - Second Edition: A data engineer's guide to building and managing ETL and ELT pipelines wit...

Microsoft 365 and SharePoint Online Cookbook - Second Edition: A complete guide to Microsoft Office 365 apps including S...

Extending Power BI with Python and R - Second Edition: Perform advanced analysis using the power of analytical languages...

Efficient Cloud FinOps: A practical guide to cloud financial management and optimization with AWS, Azure, and GCP Author...

Microsoft 365 Administrator MS-102 Exam Guide: Master the Microsoft 365 Identity and Security Platform and confidently p...

Observability with Grafana: Monitor, control, and visualize your Kubernetes and cloud platforms using the LGTM stack Aut...

Learn Grafana 10.x: A beginner's guide to practical data analytics, interactive dashboards, and observability Author: Er...