Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores...Loe edasi...
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores...Loe edasi...
Space Piracy is a forward-thinking resource that considers, analyzes, and provides solutions to the influence of the ignoble side of humanity in the realm of outer space, where potential for crime, corruption, piracy, and war increases as the...Loe edasi...
Space Piracy is a forward-thinking resource that considers, analyzes, and provides solutions to the influence of the ignoble side of humanity in the realm of outer space, where potential for crime, corruption, piracy, and war increases as the...Loe edasi...
Understand the history of hacking culture and the genesis of a powerful modern subcultureIn this audiobook, veteran information security professional Emily Crose delivers a deep dive into the history of the United States go...Loe edasi...
Understand the history of hacking culture and the genesis of a powerful modern subcultureIn this audiobook, veteran information security professional Emily Crose delivers a deep dive into the history of the United States go...Loe edasi...
In Theres No Such Thing as Crypto Crime, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum...Loe edasi...
In Theres No Such Thing as Crypto Crime, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum...Loe edasi...
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked by Len Noe, a pioneering cyborg with ten microchips implanted in his body, youll find a startlingly insightful...Loe edasi...
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked by Len Noe, a pioneering cyborg with ten microchips implanted in his body, youll find a startlingly insightful...Loe edasi...
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean prod...Loe edasi...
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean prod...Loe edasi...
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos L...Loe edasi...
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos L...Loe edasi...
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos L...Loe edasi...
A decade ago, developers built information-sharing software by writing a lot of custom code in a single code base, then adding layers of caching. Now we build information systems: interdependent software and services, data platforms, and event stream...Loe edasi...
A decade ago, developers built information-sharing software by writing a lot of custom code in a single code base, then adding layers of caching. Now we build information systems: interdependent software and services, data platforms, and event stream...Loe edasi...
A decade ago, developers built information-sharing software by writing a lot of custom code in a single code base, then adding layers of caching. Now we build information systems: interdependent software and services, data platforms, and event stream...Loe edasi...
(Ilmumisaeg: 27-Aug-2024, CD-Audio, Kirjastus: Simon & Schuster Audio, ISBN-13: 9781668118771)
New York Times Bestseller • Winner of the National Outdoor Book Award • Winner of the Saroyan International Prize for Writing • Winner of the Pacific Northwest Book Award • “The best outdoors book of the year.” —Sierra Club...Loe edasi...
In Israel and the Cyber Threat, Charles D. (Chuck) Freilich, Matthew S. Cohen, and Gabi Siboni provide a detailed and comprehensive study of Israels cyber strategy, tracing it from its origins to the present. They analyze Israels highly ad...Loe edasi...