Now a New York Times bestseller! Winner of a 2015 Prose Award!
The history of robotics and artificial intelligence in many ways is also the history of humanity’s attempts to control such technologies.
Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy.
Build, Test, and Evaluate Secure Systems
An Introduction to Building and Breaking Ciphers
The Best First Step Toward a Career in Computer Forensics
Immune Web: What makes the Internet Safe?
CISSP All-in-One Exam Guide, 7th Edition
Gain insights into Bitcoin, a cryptocurrency and a powerful technology,to optimize your Bitcoin mining techniques
Hacking For Dummies, 5th Edition
A Practical Guide
Wireshark Network Analysis, 2nd Edition
Debug and secure your Android applications with Android Studio
A Practical Guide to Online Intelligence