Cybersecurity 2022 Kids Safe Online Activity Book

Read more

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Read more

Defensive Security Handbook: Best Practices for Securing Infrastructure

Read more

Automate It with Zapier and Generative AI Harness the power of no-code workflow automation and AI

Read more

Rapid Product Development with n8n: Practical guide to creating digital products on the web using workflow automation and n8n

Read more

Identity Theft Handbook Detection, Prevention, and Security

Read more

[ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

Read more

CERT Resilience Management Model (CERT-RMM) A Maturity Model for Managing Operational Resilience (SEI Series in Software Engineering)

Read more

AI Value Creators

Read more

AI Engineering: Building Applications with Foundation Models

Read more

Architecting Data and Machine Learning Platforms

Read more

Coding with AI For Dummies

Read more

Fundamentals of Enterprise Architecture Proven Frameworks for Effective Architecture Decisions

Read more

Fundamentals of Enterprise Architecture Management Foundations for Steering the Enterprise-Wide Digital System

Read more

Enterprise Architecture As Strategy: Creating a Foundation for Business Execution

Read more

Security awareness applying practical security in your world

Read more

Designing Large Language Model Applications

Read more

Prompt Engineering

Read more

NIST Special Publication 800-160 Developing Cyber-Resilient Systems

Read more

NIST Trustworthy and Responsible AI NIST AI 100-2e2025

Read more

Python for Programmers with Introductory AI Case Studies

Read more

Windows Administration at the Command Line for Windows 2003, Windows XP

Read more

Pro ASP.NET 3.5 Server Controls and AJAX Components

Read more

SQL Server analysis services 2008 with MDX

Read more

BI_MS Press Microsoft SQL Server 2005 Analysis Services Step By Step

Read more

Mastering Digital Electronics

Read more

Proceeding Full NCDT2024

Read more

วิธีปฏิบัติงานด้านความมั่นคงปลอดภัยไซเบอร์ภาครัฐ (Practices for Government Cybersecurity)

Read more

AI Government Framework

Read more

Agentic AI FD Integrail

Read more

Generative AI and LLMs

Read more

Introduction to Fuzzy Sets, Fuzzy Logic, and Fuzzy Control Systems

Read more

Fuzzy Sets in Psychology

Read more

Foundations of Large Language Models

Read more

Generative AI Cybersecurity and Ethics

Read more

NIST Special Publication 800-207 – Zero Trust Architecture

Read more

Systems Analysis and Design, 7th Edition

Read more

วารสารวิทยาศาสตร์และเทคโนโลยีนายเรืออากาศ ปีที่ 20 ฉบับที่ 2 (2024) ก.ค – ธ.ค.2567

Read more

The Year in Tech, 2025 (Harvard Business Review)

Read more

IEEE Reference Guide

Read more

The AI-Powered Workplace: How Artificial Intelligence, Data, And Messaging Platforms Are Defining The Future Of Work

Read more

Designing Machine Learning Systems An Iterative Process for Production-Ready Applications

Read more

Designing Machine Learning Systems with Python

Read more

Generative AI in Action

Read more

Large Language Models A Deep Dive

Read more

E-banking, Fintech, _ Financial Crimes The Current Economic and Regulatory Landscape 2024th Edition

Read more

Information Security Incident and Data Breach Management A Step-by-Step Approach First Edition

Read more

Deep Learning A Practical Introduction

Read more

The AI Edge: Sales Strategies for Unleashing the Power of AI to Save Time Sell More and Crush the Competition

Read more

Digital Leadership Framework

Read more