共 2376 篇文章
标签:Security 第29页

Building CLI Applications with C# and .NET: A step-by-step guide to developing cross-platform CLI apps—from coding and t...

X-Ray Imaging: Fundamentals, Industrial Techniques and Applications Author:by Harry E. Martz (Author), Clint M. Logan (A...

Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) Author:by Nan...

IoT for Smart Grid: Revolutionizing Electrical Engineering Author:by Rahiman Zahira (Editor), Palanisamy Sivaraman (Edit...

Argo CD and Argo Workflows on Kubernetes: GitOps, workflow automation, and progressive delivery with Argo Rollouts (Engl...

Pro RESTful APIs with Micronaut: Build Java-Based Microservices with REST, JSON, and XML Author:by Sanjay Patni (Author)...

Considerations on the AI Endgame: Ethics, Risks and Computational Frameworks (Chapman & Hall/CRC Artificial Intelli...

Transformative Magic of M Code in Power Query Excel & Power BI Author:by Mike Girvin (Author) Publisher finelybook ...

Vulnerability Assessment and Penetration Testing (VAPT): Detailed guide with highlighted threats, risk exposure, and rem...

Mastering Salesforce Flow for Enterprises: An end-to-end guide to creating, troubleshooting, and using Salesforce Flows ...