计算机与互联网 第297页

The Complete Guide to Defense in Depth: Lea to identify, mitigate, and prevent cyber threats with a dynamic, layered def...
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework by: Cynthia Brumfield (...

Nine Steps to Success: An ISO 27001: 2022 Implementation Overview by: Alan Calder (Author) Publisher: Itgp Publication D...

Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and mainta...

Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and tec...

Managing Inteet of Things Applications across Edge and Cloud Data Centres (Computing and Networks) by: Rajiv Ranjan (Edi...

Java Concurrency and Parallelism: Master advanced Java techniques for cloud-based applications through concurrency and p...

Mastering Terraform: A practical guide to building and deploying infrastructure on AWS, Azure, and GCP by: Mark Tinderho...

Leaing Kali Linux: Security Testing, Penetration Testing & Ethical Hacking by: Ric Messier (Author) Publisher: OR...

Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide by: Russ White (Author) Publisher: Cisco ...