Please turn on your JavaScript for this page to function normally.
Programming Computer Vision with Python

If you want a basic understanding of computer vision’s underlying theory and algorithms, this hands-on introduction is the ideal place to start. You’ll learn …

The Information Diet: A Case for Conscious Consumption

As the amount of information we consume every day rises inexorably, we have to be aware that our brain is not able to store it and retrieve it like a computer. Also, that …

CISSP Study Guide, 2nd Edition

The CISSP certification is a globally-recognized, vendor neutral exam for information security professionals. The newest edition of this study guide is aligned to cover all of …

CompTIA Network+ Certification Boxed Set

CompTIA Network+ Certification Boxed Set provides you with a variety of exam-focused, test-prep resources designed to work together as a comprehensive program for self-study. …

Security Automation Essentials

Security Automation Essentials lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline …

The Computer Incident Response Planning Handbook

The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …

Safe C++: How to avoid common mistakes

It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …

Seven Databases in Seven Weeks

For years, the popularity of relational databases created by Oracle, Microsoft, and IBM, and of the open source MySQL, PostgreSQL, and SQLite was undisputed. But, in time, …

Hadoop: The Definitive Guide, 3rd Edition

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …

Introducing Windows Server 2012

Windows Server 2012, currently available as a Release Candidate, brings forward hundreds of new features and enhancements including cloud computing, networking, storage, …

Hacking Exposed 7: Network Security Secrets and Solutions

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …

Don't miss

Cybersecurity news