读者推荐电子书下载
-
Security in Computing
-
Introducing Python: Modern Computing in Simple Packages
-
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
-
Cloud Computing Law
-
Cyber Persistence Theory: Redefining National Security in Cyberspace
-
Quantum Computing: An Applied Approach
-
A Brief History of Computing
-
Cyber-Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and Iot
-
Advanced Programming in the UNIX Environment (Addison-Wesley Professional Computing Series)
-
Breaking IN: A Practical Guide to Starting a Career in Information Security
-
Numerical Recipes: The Art of Scientific Computing
-
Oxford International Primary Computing Student Book 1
-
A New History of Modern Computing
-
An Insider's Guide to Cloud Computing
-
Computer Security
-
Security Analysis
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
-
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
-
Ccsp Certified Cloud Security Professional All-In-One Exam Guide, Second Edition
-
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
-
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
-
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Comptia Security+ All-In-One Exam Guide, Sixth Edition (Exam Sy0-601))
-
Hacking and Pen Testing: Become an Expert in Computer Hacking and Security
-
Aws Certified Security Specialty All-In-One Exam Guide (Exam Scs-C01)
-
The Safety Trap: A Security Expert's Secrets for Staying Safe in a Dangerous World
-
The Cybersecurity Path: Insider Advice to Navigate a Successful Career in Security from Beginning to End
-
The Devops Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
-
The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations
-
Smart Cities, Smart Future: Technology, Security and Prosperity in the Connected Metropolis
-
Minecraft: Working SECURITY CAMERA, Auto MINER, New PIGLIN Bartering Farm: in Minecraft Badrock
-
Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
-
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
-
Safe All Along: Finding Peace and Security in an Uncertain World
-
Spring Security实战
-
Management of Information Security
-
Wireshark for Security Professionals
-
101 Labs - CompTIA Security+
-
Microsoft Azure Network Security
-
SAP System Security Guide
-
BPF Performance Tools (Addison-Wesley Professional Computing Series)
-
Understanding Infrastructure Edge Computing: Concepts, Technologies, and Considerations
-
Once Upon an Algorithm: How Stories Explain Computing
-
Computing Taste: Algorithms and the Makers of Music Recommendation
-
Threat Modeling: Designing for Security
-
The Modern Security Operations Center
-
Unlocking Temptation: SAFE Security 2.7
-
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
-
Comptia Security+ Practice Tests: Exam Sy0-601
-
Comptia Security+ Study Guide: Exam Sy0-601
-
Hackable: How to Do Application Security Right
-
CompTIA Security+ Study Guide: Exam SY0-601
-
CompTIA Security+ Practice Tests: Exam SY0-601
-
深入浅出Spring Security
-
Access Denied: For Reasons of National Security
-
Zero Trust Security: An Enterprise Guide
-
Exam Ref Sc-900 Microsoft Security Fundamentals
-
Enterprise Security Architecture: A Business-Driven Approach
-
Financial Statement Analysis and Security Valuation
-
Unwavering Security (Saltwater Cowboys Book 6)
-
Network Security Assessment: Know Your Network
-
The Metrics Manifesto: Confronting Security with Data
-
Comptia Security+ Certification Kit: Exam Sy0-601
-
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition (English Edition)
-
Social Security 101: Increasing Your Retirement Income: The Short & Simple Guide to Maximizing your Retirement & Social Security
-
TCP/IP Illustrated, Vol. 2: The Implementation (Addison-Wesley Professional Computing Series)
-
The Elements of Computing Systems, Second Edition: Building a Modern Computer from First Principles
-
The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles
-
Mastering Python for Bioinformatics: How to Write Flexible, Documented, Tested Python Code for Research Computing
-
Quantum Computing (WIRED guides): How It Works and How It Could Change the World
-
Learn Quantum Computing with Python and Q#: A hands-on approach
-
Convergence: Artificial Intelligence and Quantum Computing: Social, Economic, and Policy Impacts
-
Basic Security Testing with Kali Linux, Third Edition
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
-
The Art of Deception: Controlling the Human Element of Security
-
Cryptography and Network Security: Principles and Practice, Global Edition
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
-
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
-
Exam Ref Az-500 Microsoft Azure Security Technologies
-
CompTIA Security+ SY0-501 Cert Guide (Certification Guide)
-
Exam Ref Ms-101 Microsoft 365 Mobility and Security
-
Exam Ref Ms-500 Microsoft 365 Security Administration
-
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003
-
Security Engineering: A Guide to Building Dependable Distributed Systems
-
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
-
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
-
Aws Certified Security Study Guide: Specialty (Scs-C01) Exam
-
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests
-
Comptia Security+ Get Certified Get Ahead: Sy0-501 Study Guide
-
Hacking Exposed Linux: Linux Security Secrets and Solutions
-
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide
-
Difficult Choices: Taiwan's Quest for Security and the Good Life
-
Landrace Gardening: Food Security through Biodiversity and Promiscuous Pollination
-
Royal Security (The Hidden Kingdom Romances Book 2)
-
Plantation Theory: The Black Professional's Struggle Between Freedom and Security
-
Asia-Pacific Regional Security Assessment 2021: Key Developments and Trends
-
The Art of Attack: Attacker Mindset for Security Professionals
-
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
-
Global Health Security: A Blueprint for the Future
-
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
-
The New Abnormal: The Rise of the Biomedical Security State
-
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004
-
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt
-
Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition
-
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt, 2nd Edition
-
The Tech Contracts Handbook: Software Licenses, Cloud Computing Agreements, and Other IT Contracts for Lawyers and Businesspeople
-
The Simulated Multiverse: An MIT Computer Scientist Explores Parallel Universes, The Simulation Hypothesis, Quantum Computing and the Mandela Effect
-
The Simulated Multiverse: An MIT Computer Scientist Explores Parallel Universes, the Simulation Hypothesis, Quantum Computing and the Mandela Effect
-
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
-
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
-
Ccsp (Isc)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
-
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan
-
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
-
Cyberwar: The Next Threat to National Security & What to Do About It
-
(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
-
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002
-
Security+ Practice Tests (SY0-601): Prepare for the SY0-601 Exam with CertMike
-
Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite
-
Energy's Digital Future: Harnessing Innovation for American Resilience and National Security
-
Mike Meyers' Comptia Security+ Certification Guide, Third Edition (Exam Sy0-601)
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle, 3e
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Practice Tests
-
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
-
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
-
97 Things Every Information Security Professional Should Know: Practical and Approachable Advice from the Experts
-
National Security Law, Sixth Edition and Counterterrorism Law, Third Edition: 2021-2022 Supplement
-
The Quest: Energy, Security, and the Remaking of the Modern World
下载排行
-
Social Security, Medicare & Government Pensions: Get the Most Out of Your Retirement and Medical Benefits
-
Breached!: Why Data Security Law Fails and How to Improve It
-
Prepper's Home Defense: Security Strategies to Protect Your Family by Any Means Necessary
-
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
-
The Security Breach Files: An AFK Book (Five Nights at Freddy's)
-
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
-
Application Security Program Handbook: A guide for software engineers and team leaders
-
Rise of the Mavericks: The U.S. Air Force Security Service and the Cold War
-
智能语音时代:商业竞争、技术创新与虚拟永生 [Talk to Me: How Voice Computing Will Transform the]
-
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
-
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
-
CCIE/CCNP Security SNCF 300-710 Volume II: Todd Lammle Authorized: Securing Networks with Cisco Firepower (SNCF)
-
MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
-
Essentials of ICS/SCADA Cyber Security: Top 100 Real Life Project Scenarios and Tips: Extracted from Latest Projects
-
Cyber Security: Turning National Solutions Into International Cooperation: A Report of the CSIS Technology and Public Policy Program
-
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
-
CYBER SECURITY FOR BEGINNERS: A COMPREHENSIVE AND ESSENTIAL GUIDE FOR EVERY NOVICE TO UNDERSTAND AND MASTER CYBERSECURITY
-
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Crisis in the Classroom: Crisis in Education
-
The Well-Watered Woman: Rooted in Truth, Growing in Grace, Flourishing in Faith
-
Stand in Confidence: From Sinking in Insecurity to Rising in Your God-Given Identity
-
In Pictopia
-
In Chaos
-
All In
-
Zero In
-
In Nightfall
-
Skin in the Game: Hidden Asymmetries in Daily Life
-
Living in Nature: Contemporary Houses in the Natural World
-
A Little Devil in America: In Praise of Black Performance
-
The Glitter in the Green: In Search of Hummingbirds
-
Driven: Rush in the '90s and "in the End"
-
In Montmartre: Picasso, Matisse and Modernism in Paris, 1900-1910
-
Alex in Haremland: An Alice in Wonderland Spoof
-
Sequence Organization in Interaction: A Primer in Conversation Analysis I
-
All In It Together: England in the Early 21st Century
-
Wittgenstein's Philosophy in Psychology: Interpretations and Applications in Historical Context
-
Locked in Time: Animal Behavior Unearthed in 50 Extraordinary Fossils
-
Astronomy in Minutes: The night sky explained in an instant
-
Stuck In Magic: A Schooled In Magic spinoff
-
In Kiltumper: A Year in an Irish Garden
-
Goddesses in Everywoman: Powerful Archetypes in Women's Lives
-
Forks in the Road: A Life in Physics
-
Ramsay in 10: Delicious Recipes Made in a Flash
-
A Year in the Life: Adventures in British Subcultures
-
Driven: Rush in the '90s and "In the End"
-
Unity in Action, Third Edition: Multiplatform game development in C#
-
Caterpillars in the Middle: Tritrophic Interactions in a Changing World
-
XI: A Study in Power: A Study in Power
-
How Champions Think: In Sports and in Life
-
A Swim in a Pond in the Rain:
-
August in Kabul - America‘s last days in Afghanistan
-
Mouse's Wood: A Year in Nature: A Year in Nature
-
Waiting in Wonder: Growing in Faith While You're Expecting
-
Connected in Isolation: Digital Privilege in Unsettled Times
-
In Praise of Failure: Four Lessons in Humility
-
The Princess in Black and the Prince in Pink
-
How Women Work: Fitting In and Standing Out in Asia
-
Designed to Last: Our Journey of Building an Intentional Home, Growing in Faith, and Finding Joy in the In-Between
-
Hotshot in Savannah: A Made in Savannah Cozy Mystery Novel (Made in Savannah Mystery Series Book 18)
-
Haunting Past in Savannah: A Made in Savannah Cozy Mystery Novel (Made in Savannah Mystery Series Book 19)
-
Alice in Wonderland
-
In Five Years
-
The Mother-in-Law
-
Lady in the Lake
-
Things in Jars
-
Troubles in Paradise
-
Nanaville: Adventures in Grandparenting
-
In for a Penny
-
Fox in Socks
-
Bash in easy steps
-
Rust in Action
-
Unix in easy steps
-
Haskell in Depth
-
CSS in easy steps
-
Sre in Practice
-
Insieme in cucina
-
Meet Me In London
-
It's in His Kiss
-
Hidden in Plain Sight
-
In the City
-
The Tree in Me
-
Old Ireland in Colour
-
Written in Starlight
-
Etched in Bone
-
Marked in Flesh
-
Vision in Silver
-
LIFE IN THE UNIFROM
-
Murder in Time
-
Forever in Cape May
-
Dutch In Three Months
-
Peppa in Space
-
A Study in Charlotte
-
Girl in Dior
-
In Deeper Waters
-
Sky in the Deep
-
Swimming in the Dark
-
In My Mosque
-
Politics in Education
-
Salt in Prehistoric Europe
-
A Gentleman in Moscow
-
Kate in Waiting
-
Witches Steeped in Gold
-
In Her Tracks
-
Forgotten in Death
-
Love in Bloomsbury
-
Clinical Cases in Gerodontology
-
Message in a Bottle
-
In a Lonely Place
-
In Search of Tea
-
Camp Time in California
-
Athos in America
-
Funeral in Berlin
-
Crying in H Mart
-
In My Life
-
Summer in Andalucía
-
Angels in Your Presence
-
A Birthday in Quarantine
-
Singing in the Rain
-
Dinner in 10
-
Clue in the Clam
-
Tempting in Texas
-
Alice's Adventures in Wonderland
-
Napoleone in venti parole
-
Abandoned in Death
-
Castle in the Air
-
Contemporary Issues in Mediation
-
Fire in the Dark
-
All In: An Autobiography
-
The Girl in Red