Applied Security Visualization APPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book...
Beginning Arduino (Technology in Action)
Want to light up a display? Control a touch screen? Program a robot? The Arduino is a microcontroller board that can help you do all of these things, plus nearly anything you can dream up. Even better, it's inexpensive and, with the help of Beginning Arduino, Second Edition, easy to learn.
In Beginning Arduino,...
|Result Page: 257 256 255 254 253 252 251 250 249 248 247 246 245 |