• 首页
  • 经典名著少儿版
  • 全部
  • 卡通
  • 欧美
  • 科普
  • 百科
  • 党政读物
  • 日韩
  • 说服力/说话技巧
  • 爆笑/生活
  • 沟通艺术
  1. 您的位置:主页

读者推荐电子书下载

Microsoft Azure Network Security
Exam Ref Az-500 Microsoft Azure Security Technologies
Network Security Assessment: Know Your Network
Microsoft Certified Azure Fundamentals AZ-900
Exam Ref Az-900 Microsoft Azure Fundamentals
Exam Ref Az-104 Microsoft Azure Administrator
Exam Ref AZ-104 Microsoft Azure Administrator
Exam Ref Sc-900 Microsoft Security Fundamentals
Microsoft Azure Administrator AZ-104 Study Guide & Exam Prep
Exam Ref Az-303 Microsoft Azure Architect Technologies
Microsoft Certified Azure Fundamentals Study Guide: Exam Az-900
Exam Ref Az-304 Microsoft Azure Architect Design
Cryptography and Network Security: Principles and Practice, Global Edition
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
Exam Ref Ms-101 Microsoft 365 Mobility and Security
Exam Ref Ms-500 Microsoft 365 Security Administration
微软云计算:Microsoft Azure部署与管理指南
How I Passed AZ-303 Microsoft Azure Architect Technologies Exam: Sure Shot Certification Tips
Microsoft Azure Architect Technologies and Design Complete Study Guide: Exams AZ-303 and AZ-304
Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite
MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Data Engineering on Azure
Network Effect
Microsoft Virtualization
Microsoft 365 in easy steps: Covers Microsoft Office essentials
Infrastructure as Code with Azure Bicep: Streamline Azure resource deployment by bypassing ARM complexities
Network Science with Python: Explore the networks around us using Network Science, Social Network Analysis and Machine Learning
Network Programming with Go
Social Network Analysis
Network Automation Made Easy
Mastering the Lightning Network
Your Invisible Network
Microsoft Teams for Dummies
Microsoft Excel 365 Bible
精通Azure数据分析
Professional Scrum Development with Azure Devops
Power Distribution Network Design Methodologies
Network Programmability and Automation Fundamentals
Red Room: The Antisocial Network
Computer Security
Security Analysis
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Network Automation Cookbook: Proven and actionable recipes to automate and manage network devices using Ansible
Teach Yourself Visually Microsoft Teams
Exploring Microsoft Office: The Illustrated, Practical Guide to Using Office and Microsoft 365 (7) (Exploring Tech)
Securing Microsoft 365: Defending against the top Cybersecurity threats in Microsoft 365
Microsoft Excel Data Analysis and Business Modeling (Office 2021 and Microsoft 365)
Learning Microsoft Intune: Unified Endpoint Management with Intune & the Microsoft 365 product suite
Microsoft Office 365 and SharePoint Online Cookbook: An all-in-one guide to Microsoft 365 workloads, including SharePoint, Microsoft Teams, Power Platform, and more, 2nd Edition
Spring Security实战
Security in Computing
Management of Information Security
Wireshark for Security Professionals
101 Labs - CompTIA Security+
SAP System Security Guide
Comptia Network+ Certification Kit: Exam N10-007
Comptia Network+ Study Guide: Exam N10-007
Comptia Network+ Practice Tests: Exam N10-007
Moonshot: The Power of Network Effects
Comptia Network+ Certification Kit: Exam N10-008
CompTIA Network+ Practice Tests: Exam N10-008
Microprediction: Building an Open AI Network
Microsoft Visual C# Step by Step
Exam Ref Sc-100 Microsoft Cybersecurity Architect
Getting started with Bicep: Infrastructure as code on Azure
Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code
Food Network Magazine The Recipe-A-Day Kids Cookbook: 365 Fun, Easy Treats (Food Network Magazine's Kids Cookbooks)
Threat Modeling: Designing for Security
The Modern Security Operations Center
Unlocking Temptation: SAFE Security 2.7
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
Cwna Certified Wireless Network Administrator Study Guide: Exam Cwna-108
Open Radio Access Network (O-Ran) Systems Architecture and Design
The Network State: How To Start a New Country
Comptia Security+ Practice Tests: Exam Sy0-601
Comptia Security+ Study Guide: Exam Sy0-601
Hackable: How to Do Application Security Right
CompTIA Security+ Study Guide: Exam SY0-601

下载排行

CompTIA Security+ Practice Tests: Exam SY0-601
深入浅出Spring Security
Access Denied: For Reasons of National Security
Zero Trust Security: An Enterprise Guide
Enterprise Security Architecture: A Business-Driven Approach
Financial Statement Analysis and Security Valuation
Unwavering Security (Saltwater Cowboys Book 6)
The Metrics Manifesto: Confronting Security with Data
Comptia Security+ Certification Kit: Exam Sy0-601
Power BI权威指南 [Introducing Microsoft Power BI]
PowerShell: The Complete Guide For Newbies: Microsoft Powershell For Beginners
MOS Study Guide for Microsoft Excel Expert Exam MO-201
Exam Ref Pl-900 Microsoft Power Platform Fundamentals
Exam Ref Da-100 Analyzing Data with Microsoft Power Bi
Teach Yourself VISUALLY Microsoft Teams (Teach Yourself VISUALLY (Tech))
Microsoft Power BI For Dummies (For Dummies (Computer/Tech))
Exam Ref Pl-300 Microsoft Power Bi Data Analyst
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition (English Edition)
Social Security 101: Increasing Your Retirement Income: The Short & Simple Guide to Maximizing your Retirement & Social Security
Azure Solutions Architect Study Guide: Exams Az-300 and Az-301
Data Science Solutions on Azure: Tools and Techniques Using Databricks and Mlops
Azure SQL Revealed: A Guide to the Cloud for SQL Server Professionals
Beginning Azure Synapse Analytics: Transition from Data Warehouse to Data Lakehouse
Threat Hunting in the Cloud: Defending Aws, Azure and Other Cloud Platforms Against Cyberattacks
专业SCRUM:基于Azure DevOps的敏捷实践
Basic Security Testing with Kali Linux, Third Edition
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
CompTIA Security+ SY0-501 Cert Guide (Certification Guide)
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003
Security Engineering: A Guide to Building Dependable Distributed Systems
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
Aws Certified Security Study Guide: Specialty (Scs-C01) Exam
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests
Comptia Security+ Get Certified Get Ahead: Sy0-501 Study Guide
Hacking Exposed Linux: Linux Security Secrets and Solutions
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide
Difficult Choices: Taiwan's Quest for Security and the Good Life
Landrace Gardening: Food Security through Biodiversity and Promiscuous Pollination
Royal Security (The Hidden Kingdom Romances Book 2)
Plantation Theory: The Black Professional's Struggle Between Freedom and Security
Asia-Pacific Regional Security Assessment 2021: Key Developments and Trends
The Art of Attack: Attacker Mindset for Security Professionals
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Global Health Security: A Blueprint for the Future
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
Cyber Persistence Theory: Redefining National Security in Cyberspace
The New Abnormal: The Rise of the Biomedical Security State
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt
Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt, 2nd Edition
Comptia Network+ Certification All-In-One Exam Guide, Seventh Edition (Exam N10-007)
Wilful Blindness: How A Criminal Network Of Narcos, Tycoons And CCP Agents Infiltrated The West
Wilful Blindness, How a network of narcos, tycoons and CCP agents Infiltrated the West
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Food Network Magazine: The Big, Fun Kids Baking Book: 110+ Recipes for Young Bakers
Man Behind the Curtain: Inside the Secret Network of George Soros
Mastering the Lightning Network: A Second Layer Blockchain Protocol for Instant Bitcoin Payments
Postcards: The Rise and Fall of the World’s First Social Network
Comptia Network+ Certification All-In-One Exam Guide, Eighth Edition (Exam N10-008)
The Man Behind the Curtain: Inside the Secret Network of George Soros
CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)
Recipes for your Mind, Body, and Soul: From Women of the World Network™
How Organizations Should Work: envisioning a high-performing organization made of a network of internal entrepreneurs
This Was CNN: How Sex, Lies, and Spies Undid the World's Worst News Network
Microsoft Power BI 数据可视化与数据分析
Microsoft Power BI数据建模与可视化快速上手
Windows 10: 2019 User Manual . Everything You Need to Know About Microsoft Windows 10
Building a Digital Future: A Transformational Blueprint for Innovating with Microsoft Dynamics 365
Gorillas Can Dance: Lessons from Microsoft and Other Corporations on Partnering with Startups
Microsoft 365+Power Platform企业数字化转型全攻略
Microsoft Orleans for Developers: Build Cloud-Native, High-Scale, Distributed Systems in .Net Using Orleans
Exam Ref 70-345 Designing and Deploying Microsoft Exchange Server 2016
Never Far from Home: My Journey from Brooklyn to Hip Hop, Microsoft, and the Law
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Ccsp (Isc)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle

电子书更新

Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
Ccsp Certified Cloud Security Professional All-In-One Exam Guide, Second Edition
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Cyberwar: The Next Threat to National Security & What to Do About It
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002
Security+ Practice Tests (SY0-601): Prepare for the SY0-601 Exam with CertMike
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
Breaking IN: A Practical Guide to Starting a Career in Information Security
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
Comptia Security+ All-In-One Exam Guide, Sixth Edition (Exam Sy0-601))
Hacking and Pen Testing: Become an Expert in Computer Hacking and Security
Aws Certified Security Specialty All-In-One Exam Guide (Exam Scs-C01)
The Safety Trap: A Security Expert's Secrets for Staying Safe in a Dangerous World
Energy's Digital Future: Harnessing Innovation for American Resilience and National Security
Mike Meyers' Comptia Security+ Certification Guide, Third Edition (Exam Sy0-601)
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle, 3e
(Isc)2 Cissp Certified Information Systems Security Professional Official Practice Tests
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
97 Things Every Information Security Professional Should Know: Practical and Approachable Advice from the Experts
The Cybersecurity Path: Insider Advice to Navigate a Successful Career in Security from Beginning to End
National Security Law, Sixth Edition and Counterterrorism Law, Third Edition: 2021-2022 Supplement
The Devops Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
The Quest: Energy, Security, and the Remaking of the Modern World
The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
Smart Cities, Smart Future: Technology, Security and Prosperity in the Connected Metropolis
Social Security, Medicare & Government Pensions: Get the Most Out of Your Retirement and Medical Benefits
Breached!: Why Data Security Law Fails and How to Improve It
Prepper's Home Defense: Security Strategies to Protect Your Family by Any Means Necessary
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
Minecraft: Working SECURITY CAMERA, Auto MINER, New PIGLIN Bartering Farm: in Minecraft Badrock
The Security Breach Files: An AFK Book (Five Nights at Freddy's)
Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
Safe All Along: Finding Peace and Security in an Uncertain World
Application Security Program Handbook: A guide for software engineers and team leaders
Rise of the Mavericks: The U.S. Air Force Security Service and the Cold War
The Practice of System and Network Administration: Volume 1: DevOps and other Best Practices for Enterprise IT
Hacking with Kali Linux: A Practical Guide for Beginners to Learn Ethical Hacking Including Penetration Testing, Wireless Network and CyberSecurity
Student Voice Teacher's Special: 100 Teen Essays + 35 Ways to Teach Argument Writing: from The New York Times Learning Network
VMware、Citrix和Microsoft虚拟化技术详解与应用实践(电子书)
Microsoft Access 2021/365 for Beginners: 6 Projects, 45 Assignments with solutions, 368 Assignments with instant assessment
The Ultimate History of Video Games, Volume 2: Nintendo, Sony, Microsoft, and the Billion-Dollar Battle to Shape Modern Gaming
Excel 2021: The Step By Step Guide to Learn Everything That You Need To Know About Microsoft Excel 2021
Excel 2021: A Complete Guide for Beginners to Learn about the Features, Functions, Tools, and Formulas of Microsoft Excel
Mastering Microsoft Endpoint Manager: Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
The Definitive Guide to Dax: Business Intelligence for Microsoft Power Bi, SQL Server Analysis Services, and Excel
Mastering Microsoft Power BI: Expert techniques to create interactive insights for effective data analytics and business intelligence, 2nd Edition
Workflow Automation with Microsoft Power Automate: Use business process automation to achieve digital transformation with minimal code, 2nd Edition
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies
Microsoft PowerPoint Best Practices, Tips, and Techniques: Learn PowerPoint’s advanced tools and features to create and deliver engaging presentations
Software Architecture with C# 10 and .NET 6: Develop software solutions using microservices, DevOps, EF Core, and design patterns for Azure, 3rd Edition
CCIE/CCNP Security SNCF 300-710 Volume II: Todd Lammle Authorized: Securing Networks with Cisco Firepower (SNCF)
Essentials of ICS/SCADA Cyber Security: Top 100 Real Life Project Scenarios and Tips: Extracted from Latest Projects
Cyber Security: Turning National Solutions Into International Cooperation: A Report of the CSIS Technology and Public Policy Program
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
CYBER SECURITY FOR BEGINNERS: A COMPREHENSIVE AND ESSENTIAL GUIDE FOR EVERY NOVICE TO UNDERSTAND AND MASTER CYBERSECURITY
The Antisocial Network: The True Story of a Ragtag of Amateur Investors, Gamers, and Internet Trolls Who Brought Wall Street to Its Knees
The Antisocial Network: The GameStop Short Squeeze and the Ragtag Group of Amateur Traders That Brought Wall Street to Its Knees
Transformers for Natural Language Processing: Build, train, and fine-tune deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, and GPT-3, 2nd Edition
What's in It for Them?: Learn the Power of Connection to Change Your Life, Change the World, and Never Network Again
Excel 2021: An Effective Crash Course to Master Microsoft Excel 2021 in 7 Day or Less, Learn the Essential Functions, New Features, Formulas, Tips and Tricks for Beginners
Microsoft Power BI Quick Start Guide: Bring your data to life through data modeling, visualization, digital storytelling, and more, 2nd Edition
EXCEL 2022: An Up-to-Date Guide to Becoming the go-to Microsoft Excel Expert by Mastering all the Fundamentals and Advanced Functions with Practically Elaborated Examples
Microsoft 365 Excel: The Only App That Matters: Calculations, Analytics, Modeling, Data Analysis and Dashboard Reporting for the New Era of Dynamic Data Driven Decision Making Insight
应急响应:网络安全的预防、发现、处置和恢复 [Incident Response Cyber Security]
Hacking with Kali Linux: A Beginner's Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Security Systems and Tools for Computer
Prepper's Long-Term Survival Guide: Food, Shelter, Security, Off-the-Grid Power and More Life-Saving Strategies for Self-Sufficient Living
School Insecurity: A Comprehensive Guide for Parents and Educators on School Security, Protecting Your Children, and Fostering a Safe Learning Environment
Ultimate Book of Home Plans, Completely Updated & Revised 4th Edition: Over 680 Home Plans in Full Color: North America's Premier Designer Network: Sections on Home Design & Outdoor Living Ideas
Excel 2022: Become a Pro Quickly and Master Microsoft Excel Formulas and Functions from Basic to Advanced, with the Latest Step-by-step Instructions and Examples. Includes Tips and Tricks
Microsoft Office 365 for Beginners 2022: [8 in 1] The Most Updated All-in-One Guide from Beginner to Advanced | Including Excel, Word, PowerPoint, OneNote, OneDrive, Outlook, Teams and Access
Excel 2023: An Up-To-Date Guide To Master All The MS Excel Fundamentals And Advanced Functions. Become A Go-To Microsoft Excel Expert Just In 7 Days. With Practical Elaborated Examples And Formulas
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the UNIX Operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line
  • 首页
  • 图书
  • 网站地图
Copyright 阅读去吧 •手机电子书专业网站 声明:本站所有内容皆由阅读去吧自网络收集整理制作, 版权归原作者和出版社所有