读者推荐电子书下载
-
Computer Security
-
Hacking and Pen Testing: Become an Expert in Computer Hacking and Security
-
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
-
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
-
Modelling Computer Systems: The Mathematics Of Computer Science (Undergraduate Topics In Computer Science)
-
Computer Networks
-
Computer World
-
Music Theory for Computer Musicians (Computer Musicians, #1)
-
Computer Vision: Algorithms and Applications (Texts in Computer Science)
-
Security Analysis
-
Essentials of Computer Architecture
-
Cambridge IGCSE Computer Science
-
Computer Graphics from Scratch
-
Computer Networking [Global Edition]
-
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
-
Hacking with Kali Linux: A Beginner's Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Security Systems and Tools for Computer
-
Spring Security实战
-
Security in Computing
-
Management of Information Security
-
Wireshark for Security Professionals
-
101 Labs - CompTIA Security+
-
Microsoft Azure Network Security
-
SAP System Security Guide
-
Your Computer Is on Fire
-
The Self-Taught Computer Scientist: The Beginner's Guide to Computer Science
-
Art of Computer Programming, The, Volumes 1-4B, Boxed Set (Art of Computer Programming, 1-4)
-
Threat Modeling: Designing for Security
-
The Modern Security Operations Center
-
Unlocking Temptation: SAFE Security 2.7
-
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
-
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
-
Computer Coding Python Games for Kids
-
Polya Counting Theory: Combinatorics for Computer Science
-
Classic Computer Science Problems in Python
-
Computer Science: An Overview, Global Edition
-
Multiple View Geometry in Computer Vision
-
Structure and Interpretation of Computer Programs
-
Comptia Security+ Practice Tests: Exam Sy0-601
-
Comptia Security+ Study Guide: Exam Sy0-601
-
Hackable: How to Do Application Security Right
-
CompTIA Security+ Study Guide: Exam SY0-601
-
CompTIA Security+ Practice Tests: Exam SY0-601
-
深入浅出Spring Security
-
Access Denied: For Reasons of National Security
-
Zero Trust Security: An Enterprise Guide
-
Exam Ref Sc-900 Microsoft Security Fundamentals
-
Enterprise Security Architecture: A Business-Driven Approach
-
Financial Statement Analysis and Security Valuation
-
Unwavering Security (Saltwater Cowboys Book 6)
-
Network Security Assessment: Know Your Network
-
The Metrics Manifesto: Confronting Security with Data
-
Comptia Security+ Certification Kit: Exam Sy0-601
-
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition (English Edition)
-
Social Security 101: Increasing Your Retirement Income: The Short & Simple Guide to Maximizing your Retirement & Social Security
-
Code: The Hidden Language of Computer Hardware and Software
-
Hackers & Painters: Big Ideas from the Computer Age
-
Ideas That Created the Future: Classic Papers of Computer Science
-
Computer Science with Python for Class 12 (2019-2020 Examination)
-
Computer Networking: A Top-Down Approach, Global Edition
-
Algorithms to Live By: The Computer Science of Human Decisions
-
Computer Organization and Design Arm Edition: The Hardware Software Interface
-
Cambridge Igcse and O Level Computer Science Second Edition
-
The Algorithm Design Manual (Texts in Computer Science)
-
The New Turing Omnibus: Sixty-Six Excursions in Computer Science
-
Sid Meier's Memoir!: A Life in Computer Games
-
The Art of Computer Programming, Volumes 1-4a Boxed Set
-
How to Teach Computer Science: Parable, Practice and Pedagogy
-
A City Is Not a Computer: Other Urban Intelligences
-
5 Steps to a 5: AP Computer Science Principles 2022
-
5 Steps to a 5: AP Computer Science a 2022
-
Computer Time Travel: How to build a microprocessor from transistors
-
AP Computer Science A PREMIUM: With 6 Practice Tests
-
Structure and Interpretation of Computer Programs: JavaScript Edition
-
AP Computer Science A: With 6 Practice Tests
-
Microsoft Power BI For Dummies (For Dummies (Computer/Tech))
下载排行
-
Computer Science Distilled: Learn the Art of Solving Computational Problems
-
Excel Data Analysis For Dummies (For Dummies (Computer/Tech))
-
The Memory Librarian: And Other Stories of Dirty Computer
-
The Complete Guide to Blender Graphics: Computer Modeling & Animation
-
Theoretical Computer Science for the Working Category Theorist
-
The Art of Computer Programming: Combinatorial Algorithms, Volume 4b
-
The Apple II Age: How the Computer Became Personal
-
Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything
-
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the UNIX Operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line
-
Basic Security Testing with Kali Linux, Third Edition
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
-
The Art of Deception: Controlling the Human Element of Security
-
Cryptography and Network Security: Principles and Practice, Global Edition
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
-
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
-
Exam Ref Az-500 Microsoft Azure Security Technologies
-
CompTIA Security+ SY0-501 Cert Guide (Certification Guide)
-
Exam Ref Ms-101 Microsoft 365 Mobility and Security
-
Exam Ref Ms-500 Microsoft 365 Security Administration
-
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003
-
Security Engineering: A Guide to Building Dependable Distributed Systems
-
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
-
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
-
Aws Certified Security Study Guide: Specialty (Scs-C01) Exam
-
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests
-
Comptia Security+ Get Certified Get Ahead: Sy0-501 Study Guide
-
Hacking Exposed Linux: Linux Security Secrets and Solutions
-
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide
-
Difficult Choices: Taiwan's Quest for Security and the Good Life
-
Landrace Gardening: Food Security through Biodiversity and Promiscuous Pollination
-
Royal Security (The Hidden Kingdom Romances Book 2)
-
Plantation Theory: The Black Professional's Struggle Between Freedom and Security
-
Asia-Pacific Regional Security Assessment 2021: Key Developments and Trends
-
The Art of Attack: Attacker Mindset for Security Professionals
-
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
-
Global Health Security: A Blueprint for the Future
-
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
-
Cyber Persistence Theory: Redefining National Security in Cyberspace
-
The New Abnormal: The Rise of the Biomedical Security State
-
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004
-
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt
-
Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition
-
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt, 2nd Edition
-
Code: The Hidden Language of Computer Hardware and Software (Developer Best Practices)
-
Build Your Own Gaming PC: The step-by-step manual to building the ultimate computer
-
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
-
Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)
-
Princeton Review GMAT Premium Prep, 2022: 6 Computer-Adaptive Practice Tests + Review & Techniques + Online Tools
-
The Elements of Computing Systems, Second Edition: Building a Modern Computer from First Principles
-
The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles
-
Princeton Review AP Computer Science Principles Prep, 2022: 3 Practice Tests + Complete Content Review + Strategies & Techniques
-
Princeton Review AP Computer Science a Prep, 2022: 4 Practice Tests + Complete Content Review + Strategies & Techniques
-
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
-
Cambridge Igcse and O Level Computer Science Algorithms, Programming and Logic Workbook
-
Good, Better, Best: A comparison of bridge bidding systems and conventions by computer simulation
-
Computer Age Statistical Inference, Student Edition: Algorithms, Evidence, and Data Science
-
Practical Machine Learning for Computer Vision: End-To-End Machine Learning for Images
-
Mathematical Modeling And Computation In Finance: With Exercises And Python And Matlab Computer Codes
-
Python Programming: The Ultimate Beginners Guide to Learn Python Programming Step-by-Step (Computer Programming)
-
Python Programming: The Ultimate Intermediate Guide to Learn Python Machine Learning Step-by-Step (Computer Programming)
-
How to Make a Video Game All By Yourself: 10 steps, just you and a computer
-
Introduction to Computer Organization: A Guide to X86-64 Assembly Language and Gnu/Linux
-
Commodore The Inside Story: The Untold Tale of a Computer Giant
-
SQL: The Ultimate Expert Guide To Learn SQL Programming Step-by-Step (Computer Programming)
-
Princeton Review AP Computer Science Principles Prep, 2023: 3 Practice Tests + Complete Content Review + Strategies & Techniques
-
Proving Ground: The Untold Story of the Six Women Who Programmed the World’s First Modern Computer
-
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
-
Princeton Review AP Computer Science a Prep, 2023: 4 Practice Tests + Complete Content Review + Strategies & Techniques
-
Princeton Review GMAT Premium Prep, 2023: 6 Computer-Adaptive Practice Tests + Review & Techniques + Online Tools
-
TI-84 Plus CE Graphing Calculator For Dummies (For Dummies (Computer/Tech))
-
QuickBooks 2023 All-in-One For Dummies (For Dummies (Computer/Tech))
-
AP Computer Science Principles Premium, 2023: 6 Practice Tests + Comprehensive Review + Online Practice
-
Heat And Mass Transfer, 6th Edition, Si Units (Asia Higher Education Engineering/Computer Science Mechanical Engineering)
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
-
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
电子书更新
-
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
-
Ccsp (Isc)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
-
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan
-
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
-
Ccsp Certified Cloud Security Professional All-In-One Exam Guide, Second Edition
-
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
-
Cyberwar: The Next Threat to National Security & What to Do About It
-
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
-
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002
-
Security+ Practice Tests (SY0-601): Prepare for the SY0-601 Exam with CertMike
-
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
-
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
-
Breaking IN: A Practical Guide to Starting a Career in Information Security
-
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite
-
Comptia Security+ All-In-One Exam Guide, Sixth Edition (Exam Sy0-601))
-
Aws Certified Security Specialty All-In-One Exam Guide (Exam Scs-C01)
-
The Safety Trap: A Security Expert's Secrets for Staying Safe in a Dangerous World
-
Energy's Digital Future: Harnessing Innovation for American Resilience and National Security
-
Mike Meyers' Comptia Security+ Certification Guide, Third Edition (Exam Sy0-601)
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle, 3e
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Practice Tests
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
-
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
-
97 Things Every Information Security Professional Should Know: Practical and Approachable Advice from the Experts
-
The Cybersecurity Path: Insider Advice to Navigate a Successful Career in Security from Beginning to End
-
National Security Law, Sixth Edition and Counterterrorism Law, Third Edition: 2021-2022 Supplement
-
The Devops Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
-
The Quest: Energy, Security, and the Remaking of the Modern World
-
The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
-
Smart Cities, Smart Future: Technology, Security and Prosperity in the Connected Metropolis
-
Social Security, Medicare & Government Pensions: Get the Most Out of Your Retirement and Medical Benefits
-
Breached!: Why Data Security Law Fails and How to Improve It
-
Prepper's Home Defense: Security Strategies to Protect Your Family by Any Means Necessary
-
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
-
Minecraft: Working SECURITY CAMERA, Auto MINER, New PIGLIN Bartering Farm: in Minecraft Badrock
-
The Security Breach Files: An AFK Book (Five Nights at Freddy's)
-
Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
-
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
-
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
-
Safe All Along: Finding Peace and Security in an Uncertain World
-
Application Security Program Handbook: A guide for software engineers and team leaders
-
Rise of the Mavericks: The U.S. Air Force Security Service and the Cold War
-
Practical Discrete Mathematics: Discover math principles that fuel algorithms for computer science and machine learning with Python
-
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems
-
Everything You Need to Ace Computer Science and Coding in One Big Fat Notebook: The Complete Middle School Study Guide
-
Computer Coding for Kids: A unique step-by-step visual guide, from binary code to building games
-
The Animator's Survival Kit: A Manual of Methods, Principles and Formulas for Classical, Computer, Games, Stop Motion and Internet Animators
-
The Simulated Multiverse: An MIT Computer Scientist Explores Parallel Universes, The Simulation Hypothesis, Quantum Computing and the Mandela Effect
-
The Simulated Multiverse: An MIT Computer Scientist Explores Parallel Universes, the Simulation Hypothesis, Quantum Computing and the Mandela Effect
-
Learning Deep Learning: Theory and Practice of Neural Networks, Computer Vision, Natural Language Processing, and Transformers Using Tensorflow
-
Computer Coding Python Projects for Kids: A Step-by-Step Guide to Creating Your Own Python Projects
-
SQL: 3 books 1 - The Ultimate Beginner, Intermediate & Expert Guides To Master SQL Programming Quickly with Practical Exercises (Computer Programming)
-
CCIE/CCNP Security SNCF 300-710 Volume II: Todd Lammle Authorized: Securing Networks with Cisco Firepower (SNCF)
-
MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
-
Essentials of ICS/SCADA Cyber Security: Top 100 Real Life Project Scenarios and Tips: Extracted from Latest Projects
-
Cyber Security: Turning National Solutions Into International Cooperation: A Report of the CSIS Technology and Public Policy Program
-
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
-
CYBER SECURITY FOR BEGINNERS: A COMPREHENSIVE AND ESSENTIAL GUIDE FOR EVERY NOVICE TO UNDERSTAND AND MASTER CYBERSECURITY
-
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
计算机科学中的数学:信息与智能时代的必修课 [Mathematics for Computer Science]
-
COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing
-
Thinking in Algorithms: How to Combine Computer Analysis and Human Creativity for Better Problem-Solving and Decision-Making (Strategic Thinking Skills Book 2)
-
Twenty Things to Do with a Computer Forward 50: Future Visions of Education Inspired by Seymour Papert and Cynthia Solomon’s Seminal Work
-
Python Programming for Beginners: 2 Books in 1 - The Ultimate Step-by-Step Guide To Learn Python Programming Quickly with Practical Exercises (Computer Programming)
-
Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers, 2nd Edition
-
C#: 3 books in 1 - The Ultimate Beginner, Intermediate & Advanced Guides to Master C# Programming Quickly with No Experience (Computer Programming)
-
Computer Vision using AWS AI services: Build and Deploy Real-World CV Solutions with Amazon Rekognition, Lookout for Vision, and SageMaker
-
应急响应:网络安全的预防、发现、处置和恢复 [Incident Response Cyber Security]
-
Prepper's Long-Term Survival Guide: Food, Shelter, Security, Off-the-Grid Power and More Life-Saving Strategies for Self-Sufficient Living
-
School Insecurity: A Comprehensive Guide for Parents and Educators on School Security, Protecting Your Children, and Fostering a Safe Learning Environment
-
Peppa Pig Read it Yourself with Ladybird Collection 10 Books Set (Level 1-2) (Little Creatures, Fun at the Fair, Recycling Fun, The Family Computer, Daddy Pigs Old Chair, Nature Trail, Sports Day, Cam