
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, 2nd Edition
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls Author: Christopher J Hodson (Aut...
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls Author: Christopher J Hodson (Aut...
ROS Robotics Projects Author: Ramkumar Gandhinathan (Author) Publisher finelybook 出版社: Packt Publishing Edition 版本: 2n...
Serverless Handbook: Dive into modern backend. Understand any backend. Author: Swizec Teller (Author), Stas Kulesh (Illu...
Modern Computational Finance: AAD and Parallel Simulations Author: Antoine Savine (Author), Leif Andersen (Preface) Publ...
Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence Author: Atif Ali (Author), Baber Majid Bhatti (Author)...
Ultimate Deepfake Detection Using Python: Master Deep Learning Techniques like CNNs, GANs, and Transformers to Detect De...
Kubernetes in Action, Second Edition by Marko Lukša(Author) Publisher finelybook 出版社: Manning (April 25, 2023) Language...
Beautiful Math: The Surprisingly Simple Ideas behind the Digital Revolution in How We Live, Work, and Communicate Author...
The Beauty of Elementary Mathematics: And How to Teach It Author: Ron Aharoni (Author) Publisher finelybook 出版社: World ...
The Code of Honor: Embracing Ethics in Cybersecurity Author: Paul J. Maurer (Author), Ed Skoudis (Author) Publisher fine...