Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making API...Savoir plus
Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secu...Savoir plus
Book 1 - Strategies & Techniques for successful Portfolio Management * Understand what Cryptocurrency is, and why you should take advantage of the mar...Savoir plus
Blockchain technology has the potential to utterly transform supply chains, streamline processes, and improve the whole of security. Manufacturers acr...Savoir plus
If you ever wondered how this app works, or how it is possible to send information from a machine to a computer... Well, it is all due to the programm...Savoir plus
Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the g...Savoir plus
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquia...Savoir plus
Are you looking to make some quick cash? Do you enjoy the thrill of trying your luck at games of chance? If so, trading cryptocurrencies might be for ...Savoir plus
55% DISCOUNT FOR BOOKSTORES! Attract new customers with this book. They will love it! Geared toward Kali Linux users, the topic of "Open-Source operat...Savoir plus
A practical guide, based on real-world experience of problem-solving in security situations, this work shows how many threats may be countered with go...Savoir plus
★ Password Tracker Book ★ If you are tired of continually forgetting the usernames and passwords you created every time you visit a website, our Passw...Savoir plus
Description This book covers a variety of topics that are of interest now. It features personal poems from a man who was socially isolated before the ...Savoir plus
What exactly is Day Trading? Who participates in the process?Can and should you be involved to earn by investing money and create a continuous income?...Savoir plus
With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires n...Savoir plus
Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control Mechanisms, are preventive in nature. Tha...Savoir plus
The Second Edition of Internet Security: How to Defend Against Attackers on the Web (formerly titled Security Strategies in Web Applications and Socia...Savoir plus
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers ...Savoir plus
Medical information refers to any data related to a patient's medical history, mental or physical condition, diagnoses or treatment. Processing refers...Savoir plus
ETHEREUM Inside this book, you will learn all the important things about cryptocurrency and why it's suddenly trending. You'll learn why this is actua...Savoir plus
The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been s...Savoir plus
"Special Offer for Bookstores! Discounted Retail Price NOW!!" Are your customers fed up of using the boring website's layouts and want to design it be...Savoir plus
Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their da...Savoir plus
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workf...Savoir plus