Title: The Kubernetes Book, Author: Nigel Poulton
Title: The Hack Is Back: Techniques to Beat Hackers at Their Own Games, Author: Jesse Varsalone
Title: The Human Face of Big Data, Author: Rick Smolan
Title: A Hands-On Introduction to Data Science, Author: Chirag Shah
Title: Integrated Assurance: Unified Risk Strategy, Author: Patrick Hayes
Title: Introduction to Artificial Intelligence and Machine Learning, with eBook Access Code, Author: R. Kelly Rainer
Title: The Esri Guide to GIS Analysis, Volume 3: Modeling Suitability, Movement, and Interaction, Author: Andy Mitchell
Title: Securing Systems: Applied Security Architecture and Threat Models, Author: Brook S. E. Schoenfield
Title: CIO Paradox: Battling the Contradictions of It Leadership, Author: Martha Heller
Title: The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques, Author: Thomas R. Peltier
Title: Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, Author: Alyson Wilson
Title: Information Economics, Author: Urs Birchler
Title: Enabling Enterprise Transformation: Business and Grassroots Innovation for the Knowledge Economy, Author: Nagy K. Hanna
Title: Informatics: 10 Years Back. 10 Years Ahead, Author: Reinhard Wilhelm
Title: The New Economy and Economic Growth in Europe and the US, Author: David B. Audretsch
Title: Competitive Information in Small Businesses, Author: T. Chesney
Title: Managing A Network Vulnerability Assessment, Author: Thomas R. Peltier
Title: Information Economics, Author: Urs Birchler
Title: Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, Author: Mubashir Husain Rehmani
Title: Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, Author: Heru Susanto

Pagination Links