Title: AI for Beginners: How to Use Artificial Intelligence in Everyday Life: How Artificial Intelligence is Transforming Everyday Life and How You Can Harness Its Power, Author: Michael Sieley
Title: C Programming for Beginners: A Step-by-Step Guide, Author: Lov kush
Title: Censorship and Surveillance in the Digital Age: Digital Gulag or a Digital Utopia?, Author: Heinz Duthel
Title: Cyber Detox: A Beginner's Guide to Cyber Hygiene, Author: Michael Payams
Title: Cybersecurity Boot Camp: From Novice to Pro in 30 Days, Author: Cpt Roy
Title: Your new Boss looks like this: Can you Trust them?, Author: Larry D. James
Title: #HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform, Author: Albert E. Whale
Title: 'Software' - virtueller Partner oder Werkzeug: Die Erfindung der Programmiersprache, Author: Rolf Todesco
Title: 10 Things That Used to be Good Ideas in Data Security, Author: Mike Winkler
Title: 100 mandaciertos para dominar la tecnología (y no ella a ti), Author: Laura Sánchez Gutiérrez
Title: 100 Top Tips Stay Safe Online and Protect Your Privacy, Author: Nick Vandome
Title: 120 Advanced JavaScript Interview Questions, Author: Hernando Abella
Title: 150+ C Pattern Programs, Author: Hernando Abella
Title: 160 Prompt per ChatGPT: La guida essenziale per il lavoro d'ufficio, Author: Antonio Santoro Formatore
Title: 180 Casos Resueltos en Lenguaje DAX (POWER BI: CASOS RESUELTOS, #1), Author: Ramón Javier Castro Amador
Title: 20 Minutes for good Hardware Knowledge in Personal Computer Systems, Author: Daniel Lautenbacher
Title: 2011 Guide to Data Security and Mobile Privacy Issues: Data Theft Hearings and FTC Reports, Online Threats, Identity Theft, Phishing, Internet Security, Malware, Cyber Crime, Author: Progressive Management
Title: 2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution, Author: Progressive Management
Title: 2018 Department of Homeland Security Cybersecurity Strategy: Five Pillar Framework of Risk Identification, Vulnerability Reduction, Threat Reduction, Consequence Mitigation, and Cyberspace Outcomes, Author: Progressive Management
Title: 2018 Energy Department Report on Assessment of Electricity Disruption Incident Response Capabilities, Cybersecurity of Federal Networks and Critical Infrastructure, Cyber Attack Threats and Impacts, Author: Progressive Management

Pagination Links