CyberSecurity Summary

Celková dĺžka:11 h 32 min
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
CyberSecurity Summary
20:04
Synchronizing 5G Mobile Networks
CyberSecurity Summary
16:40
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
CyberSecurity Summary
15:00
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
CyberSecurity Summary
18:00
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
CyberSecurity Summary
19:54
Securing Social Networks in Cyberspace
CyberSecurity Summary
20:39
Security for Telecommunications Networks (Advances in Information Security Book 40)
CyberSecurity Summary
14:50
Enterprise Security Architecture: A Business-Driven Approach
CyberSecurity Summary
19:43
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
CyberSecurity Summary
18:33
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
CyberSecurity Summary
16:29
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
CyberSecurity Summary
20:52
Cracking the Coding Interview: 189 Programming Questions and Solutions
CyberSecurity Summary
15:35
Computer Networks, Global Edition
CyberSecurity Summary
21:40
Computer Forensics: Incident Response Essentials
CyberSecurity Summary
21:54
CompTIA Pentest+ (Practice Exams)
CyberSecurity Summary
23:32
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
CyberSecurity Summary
14:02
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
CyberSecurity Summary
14:29
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
CyberSecurity Summary
19:38
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
CyberSecurity Summary
17:24
Certificate of Cloud Auditing Knowledge Study Guide
CyberSecurity Summary
17:50
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
CyberSecurity Summary
19:35
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
CyberSecurity Summary
11:58
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
CyberSecurity Summary
16:17
Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix
CyberSecurity Summary
14:51
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
CyberSecurity Summary
16:28
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
CyberSecurity Summary
17:00
Visual Studio Code for Python Programmers
CyberSecurity Summary
15:58
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
CyberSecurity Summary
13:56
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
CyberSecurity Summary
15:37
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
CyberSecurity Summary
17:15
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
CyberSecurity Summary
14:35
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
CyberSecurity Summary
19:23
Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics
CyberSecurity Summary
17:43
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
CyberSecurity Summary
15:55
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
CyberSecurity Summary
16:43
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
CyberSecurity Summary
15:56
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
CyberSecurity Summary
13:22
Five Principles for Deploying and Managing Linux in the Cloud
CyberSecurity Summary
20:46
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
CyberSecurity Summary
18:25
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
CyberSecurity Summary
13:43