The Cruel Prince by Holly Black
- Publisher: ENGLISH GENERAL BOOKS
- Availability: In Stock
- SKU: 47674
- Number of Pages: 384
Rs.300.00
Rs.400.00
Tags: allegiances , antivirus programs , applications and standards , backstabbing , betrayal , captivating characters , captivating fantasy , case studies , character arcs , character development , complex motivations , complex relationships , comprehensive guide , confidentiality , courtly customs , courtly intrigue , critical aspects , cryptographic techniques , cunning and strength , cunning faeries , customs and rules , cyber defense , cyber protection , cybersecurity best practices , cybersecurity education , cybersecurity framework , cybersecurity fundamentals , cybersecurity strategies , cybersecurity threats , cybersecurity tools , dangerous landscape , dangerous world , dark fantasy , dark secrets , data encryption , data integrity , data protection , data security , data transmission protection , decryption , deep dive , digital security , DoS attacks , dynamic characters , emotional journey , enchanting prose , enchanting world , encryption , encryption algorithms , enthralling series , evolving protagonist , Faerie , Faerie court , faerie lore , Faerie myths , Faerie politics , fantasy novel , fey creatures , fierce determination , firewalls , formidable force , fundamental concepts , good and evil , gripping story , hidden agendas , hidden truths , high court , high stakes , Holly Black , human desires , human in Faerie , immersive experience , information assurance , information security standards , information technology security , intense drama , intense rivalry , intricate plot , intrusion detection systems , IPsec , IT infrastructure security , Jude Duarte , kidnapped mortal , layered storytelling , loyalty tests , magical battles , magical intrigue , magical realm , malware , masterful construction , moral complexities , mortal versus faerie , mysterious realms , network administration , network attacks , network defense , network encryption techniques , network monitoring , network protection , network security analysis , network security certification , network security education , network security essentials , network security management , network security practices , network security principles , network security threats , network security tools , network vulnerabilities , next installment , otherworldly setting , perilous world , personal evolution , phishing , political drama , political intrigue , political maneuvering , power plays , power struggles , powerful heroines , powerful storytelling , Prince Cardan , protecting information , psychological depth , quest for power , rich themes , ruthless ambition , ruthless faeries , secure communication , secure communication channels , secure data transmission , secure network design , secure networks , secure protocols , secure systems , security measures , security policies , security protocols , security solutions , security strategies , sixth edition , SSL/TLS , struggle for identity , students , supernatural elements , supernatural politics. , survival tactics , tension and conflict , tension-filled plot , The Cruel Prince , threat mitigation , thrilling adventure , treacherous world , unexpected alliances , unforgettable characters , unforgettable journey , vivid storytelling , VPNs , vulnerable human , William Stallings