
Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response...

Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to by pass them Author: R...

Operator Training Simulator Handbook: Best practices for developing and investing in OTS Author: Joseph Philip and Frank...

Automated Machine Learning on AWS: Fast-track the development of your production-ready machine learning applications the...

Automating Salesforce Marketing Cloud: Reap all the benefits of the SFMC platform and increase your productivity with th...

Modelling Hydrology,Hydraulics and Contaminant Transport Systems in Python Author: Dhrubajyoti Sen,Soumendra Nath Kuiry ...

Computer Processing of Remotely-Sensed Images Author: Paul M. Mather and Magaly Koch Publisher finelybook 出版社: Wiley-Bl...

Computer Vision and Internet of Things: Technologies and Applications Author: Lavanya Sharma and Mukesh Carpenter Publis...

Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue Author: Larry Clin...

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Autho...