Title: American Black Chamber, Author: Herbert O. Yardley
Title: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice / Edition 2, Author: Jason Andress
Title: Making Things Happen: Mastering Project Management / Edition 1, Author: Scott Berkun
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Numerical Methods for Ordinary Differential Equations: Initial Value Problems / Edition 1, Author: David F. Griffiths
Title: Cybernetic Revolutionaries: Technology and Politics in Allende's Chile, Author: Eden Medina
Title: How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics / Edition 74, Author: N. Katherine Hayles
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: Building Blockchain Apps / Edition 1, Author: Michael Yuan
Title: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy / Edition 2, Author: Patrick Engebretson Ph.D.
Title: Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement / Edition 2, Author: Luc Perkins
Title: Requirements Engineering Fundamentals: A Study Guide for the Certified Professional for Requirements Engineering Exam - Foundation Level - IREB compliant / Edition 2, Author: Klaus Pohl
Title: It's Our Research: Getting Stakeholder Buy-in for User Experience Research Projects, Author: Tomer Sharon
Title: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics / Edition 2, Author: John Sammons
Title: Twenty Lectures on Algorithmic Game Theory, Author: Tim Roughgarden
Title: Privacy in Context: Technology, Policy, and the Integrity of Social Life / Edition 1, Author: Helen Nissenbaum
Title: Managing Risk and Information Security: Protect to Enable / Edition 2, Author: Malcolm W. Harkins
Title: Platform Ecosystems: Aligning Architecture, Governance, and Strategy, Author: Amrit Tiwana
Title: Network Attacks and Exploitation: A Framework / Edition 1, Author: Matthew Monte
Title: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, Author: Evan Wheeler

Pagination Links