Catalog Search Results
41) Blockchain and Cryptocurrency 2 Books in 1: The Ultimate Guide to Bitcoin and its Technology – Le
Author
Description
Get a complete, 360-degree education about blockchain, cryptocurrency, and Bitcoin.
2017 has been a year of changes in the world. Above everything, the blockchain has certainly been the main innovation that will go down in history. While it is not a new technology, it has just started to show its influence. It is clear that cryptocurrencies will become more and more popular in 2020
In fact, the market of cryptocurrencies has now reached over 620...
42) Beyond the grave
Author
Series
The 39 clues. Main series volume 4
Formats
Description
Amy and Dan are hot on the trail of the fourth Clue, but their ruthless relatives will stop at nothing to eliminate them from the competition. Their hunt leads them to an ancient city that has been a hotbed of Cahill activity for centuries. The clock is ticking for Amy and Dan.
Author
Series
The 39 clues. Main series volume 8
Accelerated Reader
IL: MG - BL: 5.3 - AR Pts: 6
Description
As the race to find the 39 Clues builds to its explosive finish, Amy and Dan must explore an ancient culture and steal a Clue guarded by thousands of the world's best-trained soldiers. It's the most dangerous Clue search yet ... and it may mean the end for Amy and Dan.
44) The black circle
Author
Series
The 39 clues. Main series volume 5
Accelerated Reader
IL: MG - BL: 4.7 - AR Pts: 5
Formats
Description
A mysterious telegram sends Amy and Dan Cahill off to Russia, where they search for a treasure stolen by the Nazis, the truth about the end of the Romanov dynasty, and information about the death of their parents.
Author
Description
Dans ce livre, nous plongeons dans l'univers complexe de la sécurité des réseaux sans fil. À l'ère de la connectivité omniprésente, la protection de nos données et de notre vie privée est devenue une priorité absolue. Ce livre offre une exploration détaillée des méthodes de sécurisation des réseaux WiFi, allant du décryptage des mots de passe à la prévention des attaques malveillantes.Nous commençons par démystifier les protocoles...
Author
Series
Description
This book is based on, an in-depth filmed conversation between Howard Burton and Artur Ekert, Professor of Quantum Physics at the Mathematical Institute at the University of Oxford and Director of the Centre for Quantum Technologies and Lee Kong Chian Centennial Professor at the National University of Singapore. Artur Ekert is best known as one of the pioneers of quantum cryptography. This wide-ranging conversation provides detailed insights into...
Author
Series
Description
Security Engineering is the third domain of the Certified Information Systems Security Professional certification. In this course we will cover the following: secure design principle and processes, fundamental concepts of security modules, security evaluation models, security capabilities of information systems, vulnerabilities in security architecture and technology components, cryptography and site and secure facility design.
Author
Description
Time-Based One-Time Passwords (TOTP) add an extra level of security around your vital electronic data. Traditional passwords once provided a reasonable barrier between protected content and data thieves. But massive data breaches and published lists of the most commonly used pass codes have reduced the effectiveness of such simple locks.Time-Based One-Time Passwords: A Primer in C# introduces you to the TOTP algorithm, a great tool for enhancing existing...
Author
Description
Embark on an enlightening journey into the boundless realm of tomorrow with "Unchaining Tomorrow: Navigating the World of Blockchain." In this comprehensive exploration, we invite you to traverse the intricate landscape of blockchain technology, a transformative force reshaping the very foundations of our digital future.Dive deep into the heart of decentralization, a core tenet of blockchain's philosophy. Gain a nuanced understanding of the technology's...
Author
Description
Embark on a transformative odyssey as you delve into the pages of "Unlocking the NFT Universe: A Journey into Digital Ownership." This immersive exploration takes you beyond the surface of digital landscapes, unlocking the intricacies of Non-Fungible Tokens (NFTs) and reshaping your understanding of ownership in the digital era.At the heart of this journey lies the concept of tokenization, a revolutionary force powered by blockchain technology. Unravel...
51) Day of doom
Author
Series
Accelerated Reader
IL: MG - BL: 4.5 - AR Pts: 8
Formats
Description
It started with a kidnapping. A shadowy organization known only as the Vespers snatched seven members of the Cahill family and demanded a series of bizarre ransoms from around the world. Thirteen-year-old Dan Cahill and his older sister Amy began a global treasure hunt, determined to bring back whatever Vesper One needed, so long as it kept the hostages safe. But when they deliver the last ransom, Amy and Dan discover Vesper One's terrifying endgame....
Author
Description
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! ����
Are you ready to master the art of ethical hacking and become a formidable defender of the digital realm? Look no further! Dive into the world of cybersecurity with our comprehensive book bundle, "Cyber Auditing Unleashed." This four-book collection is your ticket to advanced security auditing, providing you...
Author
Description
Elevate your understanding of security in the age of artificial intelligence with "AI Unleashed: Transforming Security Operations for the Future." Step into a world where technology and protection converge, where innovation is the key to safeguarding the future. This captivating book beckons you to embark on an enlightening journey into the future of security. **Unveiling the AI Revolution:**Are you ready to witness the seismic shift that AI is ushering...
Author
Series
Description
Conversations About Philosophy, Volume 2, includes the following 5 carefully-edited Ideas Roadshow Conversations featuring leading physicists. This collection includes a detailed preface highlighting the connections between the different books. Each book is broken into chapters with a detailed introduction and questions for discussion at the end of each chapter:
1. The Power of Principles: Physics Revealed - A Conversation with Nima Arkani-Hamed,...
Author
Description
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into the fascinating field of cybersecurity, illuminating the many prospects, difficulties, and routes to success in this highly sought-after profession. Because businesses, governments, and individuals rely on the security of their digital assets and data, cybersecurity...
Author
Description
Introducing the "Zero Trust Security" Book Bundle: Building Cyber Resilience & Robust Security Postures!
In an age of digital transformation, securing your digital world has never been more crucial. The "Zero Trust Security" book bundle is your comprehensive guide to revolutionize your cybersecurity strategies, from beginners to seasoned experts.
Book 1-Zero Trust Security: A Beginner's Guide to Building Cyber Resilience: Discover the foundational...
Author
Description
Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click....
58) Trust no one
Author
Series
Accelerated Reader
IL: MG - BL: 4.7 - AR Pts: 6
Formats
Description
When seven members of their family were kidnapped, thirteen-year-old Dan Cahill and his older sister, Amy, got ready for the fight of their lives. But their enemy, a terrifying group known as the Vespers, remained frustratingly elusive. They stay in the shadows, picking off Cahills one by one. And now the Vespers have landed their most serious blow yet ? A blow that strikes at the very heart of the Cahill family. Because Amy and Dan discover that...
Author
Formats
Description
The Venona Secrets presents one of the last great, untold stories of World War II and the Cold War.
In 1995, secret Soviet cable traffic from the 1940s that the United States intercepted and eventually decrypted finally became available to American historians. Now, after spending more than five years researching all the available evidence, espionage experts Herbert Romerstein and Eric Breindel reveal the full, shocking story of the days when Soviet...
Author
Series
Accelerated Reader
IL: MG - BL: 4 - AR Pts: 5
Formats
Description
"The Vespers have crossed a line. Amy and Dan were devastated when the Vespers kidnapped seven Cahills around the world, holding them hostage until Amy and Dan delivered an impossible ransom. But at least the hostages were Cahills - members of the world's most powerful family, trained to face all odds. Now the Vespers have gone too far. They've kidnapped Atticus, an innocent 11 year old boy and Dan's only friend. Now Dan and Amy are in the struggle...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request