Title: ITIL Foundation Essentials ITIL 4 Edition - The ultimate revision guide, Author: Claire Agutter
Title: Automate the Boring Stuff with Python, 3rd Edition, Author: Al Sweigart
Title: Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS, Author: Travis Plunk
Title: Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level, Author: Paul Huijbregts
Title: Technology Coordinator's Handbook, Fourth Edition: A Guide for Edtech Facilitators and Leaders, Author: Max Frazier
Title: The Secret Life of Programs: Understand Computers -- Craft Better Code, Author: Jonathan E. Steinhart
Title: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: Exposed: Desire and Disobedience in the Digital Age, Author: Bernard E. Harcourt
Title: Application Security Program Handbook, Author: Derek Fisher
Title: Linux Firewalls: Attack Detection and Response, Author: Michael Rash
Title: Observability with Grafana: Monitor, control, and visualize your Kubernetes and cloud platforms using the LGTM stack, Author: Rob Chapman
Title: Math for Programming, Author: Ronald T. Kneusel
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Cybersecurity All-in-One For Dummies, Author: Joseph Steinberg
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: AWS Certified Solutions Architect Study Guide with 900 Practice Test Questions: Associate (SAA-C03) Exam, Author: Ben Piper
Title: Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence, Author: Nick Furneaux
Title: Lean Six Sigma in the Age of Artificial Intelligence: Harnessing the Power of the Fourth Industrial Revolution, Author: Michael L. George Sr.
Title: 97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts, Author: Christina Morillo
Title: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data, Author: Micah Lee

Pagination Links