读者推荐电子书下载
-
Microsoft Azure Network Security
-
Exam Ref Az-500 Microsoft Azure Security Technologies
-
Network Security Assessment: Know Your Network
-
Microsoft Certified Azure Fundamentals AZ-900
-
Exam Ref Az-900 Microsoft Azure Fundamentals
-
Exam Ref Az-104 Microsoft Azure Administrator
-
Exam Ref AZ-104 Microsoft Azure Administrator
-
Exam Ref Sc-900 Microsoft Security Fundamentals
-
Microsoft Azure Administrator AZ-104 Study Guide & Exam Prep
-
Exam Ref Az-303 Microsoft Azure Architect Technologies
-
Microsoft Certified Azure Fundamentals Study Guide: Exam Az-900
-
Exam Ref Az-304 Microsoft Azure Architect Design
-
Cryptography and Network Security: Principles and Practice, Global Edition
-
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Exam Ref Ms-101 Microsoft 365 Mobility and Security
-
Exam Ref Ms-500 Microsoft 365 Security Administration
-
微软云计算:Microsoft Azure部署与管理指南
-
How I Passed AZ-303 Microsoft Azure Architect Technologies Exam: Sure Shot Certification Tips
-
Microsoft Azure Architect Technologies and Design Complete Study Guide: Exams AZ-303 and AZ-304
-
Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite
-
MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
-
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
-
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
-
Data Engineering on Azure
-
Network Effect
-
Microsoft Virtualization
-
Microsoft 365 in easy steps: Covers Microsoft Office essentials
-
Infrastructure as Code with Azure Bicep: Streamline Azure resource deployment by bypassing ARM complexities
-
Network Science with Python: Explore the networks around us using Network Science, Social Network Analysis and Machine Learning
-
Network Programming with Go
-
Social Network Analysis
-
Network Automation Made Easy
-
Mastering the Lightning Network
-
Your Invisible Network
-
Microsoft Teams for Dummies
-
Microsoft Excel 365 Bible
-
精通Azure数据分析
-
Professional Scrum Development with Azure Devops
-
Power Distribution Network Design Methodologies
-
Network Programmability and Automation Fundamentals
-
Red Room: The Antisocial Network
-
Computer Security
-
Security Analysis
-
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
-
Network Automation Cookbook: Proven and actionable recipes to automate and manage network devices using Ansible
-
Teach Yourself Visually Microsoft Teams
-
Exploring Microsoft Office: The Illustrated, Practical Guide to Using Office and Microsoft 365 (7) (Exploring Tech)
-
Securing Microsoft 365: Defending against the top Cybersecurity threats in Microsoft 365
-
Microsoft Excel Data Analysis and Business Modeling (Office 2021 and Microsoft 365)
-
Learning Microsoft Intune: Unified Endpoint Management with Intune & the Microsoft 365 product suite
-
Microsoft Office 365 and SharePoint Online Cookbook: An all-in-one guide to Microsoft 365 workloads, including SharePoint, Microsoft Teams, Power Platform, and more, 2nd Edition
-
Spring Security实战
-
Security in Computing
-
Management of Information Security
-
Wireshark for Security Professionals
-
101 Labs - CompTIA Security+
-
SAP System Security Guide
-
Comptia Network+ Certification Kit: Exam N10-007
-
Comptia Network+ Study Guide: Exam N10-007
-
Comptia Network+ Practice Tests: Exam N10-007
-
Moonshot: The Power of Network Effects
-
Comptia Network+ Certification Kit: Exam N10-008
-
CompTIA Network+ Practice Tests: Exam N10-008
-
Microprediction: Building an Open AI Network
-
Microsoft Visual C# Step by Step
-
Exam Ref Sc-100 Microsoft Cybersecurity Architect
-
Getting started with Bicep: Infrastructure as code on Azure
-
Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code
-
Food Network Magazine The Recipe-A-Day Kids Cookbook: 365 Fun, Easy Treats (Food Network Magazine's Kids Cookbooks)
-
Threat Modeling: Designing for Security
-
The Modern Security Operations Center
-
Unlocking Temptation: SAFE Security 2.7
-
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
-
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
-
Cwna Certified Wireless Network Administrator Study Guide: Exam Cwna-108
-
Open Radio Access Network (O-Ran) Systems Architecture and Design
-
The Network State: How To Start a New Country
-
Comptia Security+ Practice Tests: Exam Sy0-601
-
Comptia Security+ Study Guide: Exam Sy0-601
-
Hackable: How to Do Application Security Right
-
CompTIA Security+ Study Guide: Exam SY0-601
下载排行
-
CompTIA Security+ Practice Tests: Exam SY0-601
-
深入浅出Spring Security
-
Access Denied: For Reasons of National Security
-
Zero Trust Security: An Enterprise Guide
-
Enterprise Security Architecture: A Business-Driven Approach
-
Financial Statement Analysis and Security Valuation
-
Unwavering Security (Saltwater Cowboys Book 6)
-
The Metrics Manifesto: Confronting Security with Data
-
Comptia Security+ Certification Kit: Exam Sy0-601
-
Power BI权威指南 [Introducing Microsoft Power BI]
-
PowerShell: The Complete Guide For Newbies: Microsoft Powershell For Beginners
-
MOS Study Guide for Microsoft Excel Expert Exam MO-201
-
Exam Ref Pl-900 Microsoft Power Platform Fundamentals
-
Exam Ref Da-100 Analyzing Data with Microsoft Power Bi
-
Teach Yourself VISUALLY Microsoft Teams (Teach Yourself VISUALLY (Tech))
-
Microsoft Power BI For Dummies (For Dummies (Computer/Tech))
-
Exam Ref Pl-300 Microsoft Power Bi Data Analyst
-
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition (English Edition)
-
Social Security 101: Increasing Your Retirement Income: The Short & Simple Guide to Maximizing your Retirement & Social Security
-
Azure Solutions Architect Study Guide: Exams Az-300 and Az-301
-
Data Science Solutions on Azure: Tools and Techniques Using Databricks and Mlops
-
Azure SQL Revealed: A Guide to the Cloud for SQL Server Professionals
-
Beginning Azure Synapse Analytics: Transition from Data Warehouse to Data Lakehouse
-
Threat Hunting in the Cloud: Defending Aws, Azure and Other Cloud Platforms Against Cyberattacks
-
专业SCRUM:基于Azure DevOps的敏捷实践
-
Basic Security Testing with Kali Linux, Third Edition
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
-
The Art of Deception: Controlling the Human Element of Security
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
-
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
-
CompTIA Security+ SY0-501 Cert Guide (Certification Guide)
-
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003
-
Security Engineering: A Guide to Building Dependable Distributed Systems
-
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
-
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
-
Aws Certified Security Study Guide: Specialty (Scs-C01) Exam
-
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests
-
Comptia Security+ Get Certified Get Ahead: Sy0-501 Study Guide
-
Hacking Exposed Linux: Linux Security Secrets and Solutions
-
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide
-
Difficult Choices: Taiwan's Quest for Security and the Good Life
-
Landrace Gardening: Food Security through Biodiversity and Promiscuous Pollination
-
Royal Security (The Hidden Kingdom Romances Book 2)
-
Plantation Theory: The Black Professional's Struggle Between Freedom and Security
-
Asia-Pacific Regional Security Assessment 2021: Key Developments and Trends
-
The Art of Attack: Attacker Mindset for Security Professionals
-
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
-
Global Health Security: A Blueprint for the Future
-
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
-
Cyber Persistence Theory: Redefining National Security in Cyberspace
-
The New Abnormal: The Rise of the Biomedical Security State
-
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004
-
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt
-
Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition
-
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt, 2nd Edition
-
Comptia Network+ Certification All-In-One Exam Guide, Seventh Edition (Exam N10-007)
-
Wilful Blindness: How A Criminal Network Of Narcos, Tycoons And CCP Agents Infiltrated The West
-
Wilful Blindness, How a network of narcos, tycoons and CCP agents Infiltrated the West
-
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
-
Food Network Magazine: The Big, Fun Kids Baking Book: 110+ Recipes for Young Bakers
-
Man Behind the Curtain: Inside the Secret Network of George Soros
-
Mastering the Lightning Network: A Second Layer Blockchain Protocol for Instant Bitcoin Payments
-
Postcards: The Rise and Fall of the World’s First Social Network
-
Comptia Network+ Certification All-In-One Exam Guide, Eighth Edition (Exam N10-008)
-
The Man Behind the Curtain: Inside the Secret Network of George Soros
-
CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)
-
Recipes for your Mind, Body, and Soul: From Women of the World Network™
-
How Organizations Should Work: envisioning a high-performing organization made of a network of internal entrepreneurs
-
This Was CNN: How Sex, Lies, and Spies Undid the World's Worst News Network
-
Microsoft Power BI 数据可视化与数据分析
-
Microsoft Power BI数据建模与可视化快速上手
-
Windows 10: 2019 User Manual . Everything You Need to Know About Microsoft Windows 10
-
Building a Digital Future: A Transformational Blueprint for Innovating with Microsoft Dynamics 365
-
Gorillas Can Dance: Lessons from Microsoft and Other Corporations on Partnering with Startups
-
Microsoft 365+Power Platform企业数字化转型全攻略
-
Microsoft Orleans for Developers: Build Cloud-Native, High-Scale, Distributed Systems in .Net Using Orleans
-
Exam Ref 70-345 Designing and Deploying Microsoft Exchange Server 2016
-
Never Far from Home: My Journey from Brooklyn to Hip Hop, Microsoft, and the Law
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
-
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
-
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
-
Ccsp (Isc)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
电子书更新
-
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan
-
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
-
Ccsp Certified Cloud Security Professional All-In-One Exam Guide, Second Edition
-
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
-
Cyberwar: The Next Threat to National Security & What to Do About It
-
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
-
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002
-
Security+ Practice Tests (SY0-601): Prepare for the SY0-601 Exam with CertMike
-
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
-
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
-
Breaking IN: A Practical Guide to Starting a Career in Information Security
-
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Comptia Security+ All-In-One Exam Guide, Sixth Edition (Exam Sy0-601))
-
Hacking and Pen Testing: Become an Expert in Computer Hacking and Security
-
Aws Certified Security Specialty All-In-One Exam Guide (Exam Scs-C01)
-
The Safety Trap: A Security Expert's Secrets for Staying Safe in a Dangerous World
-
Energy's Digital Future: Harnessing Innovation for American Resilience and National Security
-
Mike Meyers' Comptia Security+ Certification Guide, Third Edition (Exam Sy0-601)
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle, 3e
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Practice Tests
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
-
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
-
97 Things Every Information Security Professional Should Know: Practical and Approachable Advice from the Experts
-
The Cybersecurity Path: Insider Advice to Navigate a Successful Career in Security from Beginning to End
-
National Security Law, Sixth Edition and Counterterrorism Law, Third Edition: 2021-2022 Supplement
-
The Devops Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
-
The Quest: Energy, Security, and the Remaking of the Modern World
-
The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
-
Smart Cities, Smart Future: Technology, Security and Prosperity in the Connected Metropolis
-
Social Security, Medicare & Government Pensions: Get the Most Out of Your Retirement and Medical Benefits
-
Breached!: Why Data Security Law Fails and How to Improve It
-
Prepper's Home Defense: Security Strategies to Protect Your Family by Any Means Necessary
-
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
-
Minecraft: Working SECURITY CAMERA, Auto MINER, New PIGLIN Bartering Farm: in Minecraft Badrock
-
The Security Breach Files: An AFK Book (Five Nights at Freddy's)
-
Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
-
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
-
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
-
Safe All Along: Finding Peace and Security in an Uncertain World
-
Application Security Program Handbook: A guide for software engineers and team leaders
-
Rise of the Mavericks: The U.S. Air Force Security Service and the Cold War
-
The Practice of System and Network Administration: Volume 1: DevOps and other Best Practices for Enterprise IT
-
Hacking with Kali Linux: A Practical Guide for Beginners to Learn Ethical Hacking Including Penetration Testing, Wireless Network and CyberSecurity
-
Student Voice Teacher's Special: 100 Teen Essays + 35 Ways to Teach Argument Writing: from The New York Times Learning Network
-
VMware、Citrix和Microsoft虚拟化技术详解与应用实践(电子书)
-
Microsoft Access 2021/365 for Beginners: 6 Projects, 45 Assignments with solutions, 368 Assignments with instant assessment
-
The Ultimate History of Video Games, Volume 2: Nintendo, Sony, Microsoft, and the Billion-Dollar Battle to Shape Modern Gaming
-
Excel 2021: The Step By Step Guide to Learn Everything That You Need To Know About Microsoft Excel 2021
-
Excel 2021: A Complete Guide for Beginners to Learn about the Features, Functions, Tools, and Formulas of Microsoft Excel
-
Mastering Microsoft Endpoint Manager: Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
The Definitive Guide to Dax: Business Intelligence for Microsoft Power Bi, SQL Server Analysis Services, and Excel
-
Mastering Microsoft Power BI: Expert techniques to create interactive insights for effective data analytics and business intelligence, 2nd Edition
-
Workflow Automation with Microsoft Power Automate: Use business process automation to achieve digital transformation with minimal code, 2nd Edition
-
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Microsoft PowerPoint Best Practices, Tips, and Techniques: Learn PowerPoint’s advanced tools and features to create and deliver engaging presentations
-
Software Architecture with C# 10 and .NET 6: Develop software solutions using microservices, DevOps, EF Core, and design patterns for Azure, 3rd Edition
-
CCIE/CCNP Security SNCF 300-710 Volume II: Todd Lammle Authorized: Securing Networks with Cisco Firepower (SNCF)
-
Essentials of ICS/SCADA Cyber Security: Top 100 Real Life Project Scenarios and Tips: Extracted from Latest Projects
-
Cyber Security: Turning National Solutions Into International Cooperation: A Report of the CSIS Technology and Public Policy Program
-
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
-
CYBER SECURITY FOR BEGINNERS: A COMPREHENSIVE AND ESSENTIAL GUIDE FOR EVERY NOVICE TO UNDERSTAND AND MASTER CYBERSECURITY
-
The Antisocial Network: The True Story of a Ragtag of Amateur Investors, Gamers, and Internet Trolls Who Brought Wall Street to Its Knees
-
The Antisocial Network: The GameStop Short Squeeze and the Ragtag Group of Amateur Traders That Brought Wall Street to Its Knees
-
Transformers for Natural Language Processing: Build, train, and fine-tune deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, and GPT-3, 2nd Edition
-
What's in It for Them?: Learn the Power of Connection to Change Your Life, Change the World, and Never Network Again
-
Excel 2021: An Effective Crash Course to Master Microsoft Excel 2021 in 7 Day or Less, Learn the Essential Functions, New Features, Formulas, Tips and Tricks for Beginners
-
Microsoft Power BI Quick Start Guide: Bring your data to life through data modeling, visualization, digital storytelling, and more, 2nd Edition
-
EXCEL 2022: An Up-to-Date Guide to Becoming the go-to Microsoft Excel Expert by Mastering all the Fundamentals and Advanced Functions with Practically Elaborated Examples
-
Microsoft 365 Excel: The Only App That Matters: Calculations, Analytics, Modeling, Data Analysis and Dashboard Reporting for the New Era of Dynamic Data Driven Decision Making Insight
-
应急响应:网络安全的预防、发现、处置和恢复 [Incident Response Cyber Security]
-
Hacking with Kali Linux: A Beginner's Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Security Systems and Tools for Computer
-
Prepper's Long-Term Survival Guide: Food, Shelter, Security, Off-the-Grid Power and More Life-Saving Strategies for Self-Sufficient Living
-
School Insecurity: A Comprehensive Guide for Parents and Educators on School Security, Protecting Your Children, and Fostering a Safe Learning Environment
-
Ultimate Book of Home Plans, Completely Updated & Revised 4th Edition: Over 680 Home Plans in Full Color: North America's Premier Designer Network: Sections on Home Design & Outdoor Living Ideas
-
Excel 2022: Become a Pro Quickly and Master Microsoft Excel Formulas and Functions from Basic to Advanced, with the Latest Step-by-step Instructions and Examples. Includes Tips and Tricks
-
Microsoft Office 365 for Beginners 2022: [8 in 1] The Most Updated All-in-One Guide from Beginner to Advanced | Including Excel, Word, PowerPoint, OneNote, OneDrive, Outlook, Teams and Access
-
Excel 2023: An Up-To-Date Guide To Master All The MS Excel Fundamentals And Advanced Functions. Become A Go-To Microsoft Excel Expert Just In 7 Days. With Practical Elaborated Examples And Formulas
-
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the UNIX Operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line