Information Technology Ebooks
Trending ebooks
The most talked-about and well-loved Information Technology titles this month.
The Conscious Universe: Parts and Wholes in Physical Reality Rating: 3 out of 5 stars3/5AJAX and PHP: Building Responsive Web Applications Rating: 4 out of 5 stars4/5Big Data Analytics: Disruptive Technologies for Changing the Game Rating: 4 out of 5 stars4/5Supercommunicator: Explaining the Complicated So Anyone Can Understand Rating: 3 out of 5 stars3/5The Truth Machine: The Blockchain and the Future of Everything Rating: 0 out of 5 stars0 ratingsThe LATEX Graphics Companion: Tools and Techniques for Computer Typesetting Rating: 3 out of 5 stars3/5Delete: The Virtue of Forgetting in the Digital Age Rating: 3 out of 5 stars3/5When We Are No More: How Digital Memory Is Shaping Our Future Rating: 3 out of 5 stars3/5Holding On to Reality: The Nature of Information at the Turn of the Millennium Rating: 3 out of 5 stars3/5Overdrive: Bill Gates and the Race to Control Cyberspace Rating: 0 out of 5 stars0 ratingsBitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Rating: 5 out of 5 stars5/5Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 3 out of 5 stars3/5The Myth of Digital Democracy Rating: 3 out of 5 stars3/5Exodus to the Virtual World: How Online Fun Is Changing Reality Rating: 2 out of 5 stars2/5Digital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5Machines Behaving Badly: The Morality of AI Rating: 4 out of 5 stars4/5Quantum Chance: Nonlocality, Teleportation and Other Quantum Marvels Rating: 4 out of 5 stars4/5Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet Rating: 4 out of 5 stars4/5Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 Rating: 4 out of 5 stars4/5The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Rating: 4 out of 5 stars4/5Creating your MySQL Database: Practical Design Tips and Techniques Rating: 3 out of 5 stars3/5Unity Game Development Essentials Rating: 5 out of 5 stars5/5Dissecting the Hack: The F0rb1dd3n Network, Revised Edition: The F0rb1dd3n Network Rating: 4 out of 5 stars4/5Selling Information Governance to the Business: Best Practices by Industry and Job Function Rating: 0 out of 5 stars0 ratingsMatplotlib for Python Developers Rating: 3 out of 5 stars3/5Analyzing Social Media Networks with NodeXL: Insights from a Connected World Rating: 4 out of 5 stars4/5Pervasive Information Architecture: Designing Cross-Channel User Experiences Rating: 3 out of 5 stars3/5Understanding AS/400 System Operations Rating: 5 out of 5 stars5/5Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
There’s more to discover in Information Technology
Escape into new ebooks and new adventures.
Linux Server Cookbook: Get Hands-on Recipes to Install, Configure, and Administer a Linux Server Effectively (English Edition) Rating: 0 out of 5 stars0 ratingsSoftware Testing at Scale Rating: 0 out of 5 stars0 ratingsCompTIA Security+: Securing Networks Rating: 0 out of 5 stars0 ratingsCharacter Expression: Using ChatGPT to Write Believable Emotions in Fiction Rating: 0 out of 5 stars0 ratingsEarn Millions Using AI Tools Rating: 0 out of 5 stars0 ratingsSimply Chat A Book Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 0 out of 5 stars0 ratingsChatGPT: The Future of Intelligent Conversation Rating: 5 out of 5 stars5/5The DevOps Mokitas: Avoid the Elephants in Your DevOps Adoption: A Handbook of Devops Mistakes to Avoid Rating: 0 out of 5 stars0 ratingsDon’t Ever Think About Passwords Again Rating: 0 out of 5 stars0 ratingsThe API-First Transformation Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsFeature Selection in Machine Learning with Python Rating: 0 out of 5 stars0 ratingsCompTIA Security+: Network Attacks Rating: 0 out of 5 stars0 ratingsRequirements Analysis Challenges and Solutions Rating: 0 out of 5 stars0 ratingsElicitation Questions for Business Analysis Information Rating: 0 out of 5 stars0 ratingsHealth Informatics: Practical Guide Rating: 0 out of 5 stars0 ratingsInternet of Things Theory and Practice: Build Smarter Projects to Explore the IoT Architecture and Applications (English Edition) Rating: 0 out of 5 stars0 ratingsLearn IoT Programming Using Node-RED: Begin to Code Full Stack IoT Apps and Edge Devices with Raspberry Pi, NodeJS, and Grafana Rating: 0 out of 5 stars0 ratingsMachine Learning: Master Supervised and Unsupervised Learning Algorithms with Real Examples (English Edition) Rating: 0 out of 5 stars0 ratingsApplication Observability with Elastic: Real-time metrics, logs, errors, traces, root cause analysis, and anomaly detection Rating: 0 out of 5 stars0 ratingsPower BI Data Modeling: Build Interactive Visualizations, Learn DAX, Power Query, and Develop BI Models Rating: 0 out of 5 stars0 ratingsPrinciples of Data Management: Facilitating information sharing Rating: 0 out of 5 stars0 ratings7 Rules To Become Exceptional At Cyber Security Rating: 5 out of 5 stars5/5How To Stay Private Online Rating: 0 out of 5 stars0 ratingsEdge Computing: A Primer Rating: 0 out of 5 stars0 ratingsPhysical Implementation of Quantum Walks Rating: 0 out of 5 stars0 ratingsInside Radio: An Attack and Defense Guide Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsDocker Demystified Rating: 0 out of 5 stars0 ratingsAttribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage Rating: 0 out of 5 stars0 ratings