Title: The Hack Is Back: Techniques to Beat Hackers at Their Own Games, Author: Jesse Varsalone
Title: Introduction to Artificial Intelligence and Machine Learning, with eBook Access Code, Author: R. Kelly Rainer
Title: Integrated Assurance: Unified Risk Strategy, Author: Patrick Hayes
Title: The Esri Guide to GIS Analysis, Volume 3: Modeling Suitability, Movement, and Interaction, Author: Andy Mitchell
Title: The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques, Author: Thomas R. Peltier
Title: Managing A Network Vulnerability Assessment, Author: Thomas R. Peltier
Title: The Handbook of Applied Expert Systems, Author: Jay Liebowitz
Title: Members, Methods, and Measures: Unlocking the Secrets of IT Leadership, Author: Thomas E. Armstrong
Title: Disturbance Observer-Based Control: Methods and Applications, Author: Shihua Li
Title: Advanced Excel 365: Including ChatGPT Tips, Author: Ritu Arora
Title: Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, Author: Alyson Wilson
Title: Information Economics, Author: Urs Birchler
Title: Enabling Enterprise Transformation: Business and Grassroots Innovation for the Knowledge Economy, Author: Nagy K. Hanna
Title: Informatics: 10 Years Back. 10 Years Ahead, Author: Reinhard Wilhelm
Title: The New Economy and Economic Growth in Europe and the US, Author: David B. Audretsch
Title: Competitive Information in Small Businesses, Author: T. Chesney
Title: Applying Artificial Intelligence in Project Management, Author: Paul Boudreau
Title: Introduction to Certificateless Cryptography, Author: Hu Xiong
Title: Theory, Design, and Applications of Unmanned Aerial Vehicles, Author: A. R. Jha
Title: Cybercrime Investigations: A Comprehensive Resource for Everyone, Author: John Bandler

Pagination Links