Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: Learning Theory from First Principles, Author: Francis Bach
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Multi-Agent Reinforcement Learning: Foundations and Modern Approaches, Author: Stefano V. Albrecht
Title: Perspectives in Antenna Technology: Recent Advances and Systems Applications, Author: Jeffrey S. Herd
Title: Formal Methods for Multi-Agent Feedback Control Systems, Author: Lars Lindemann
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches, Author: Josephine Wolff
Title: Writing for Developers: Blogs that get read, Author: Piotr Sarna
Title: Quarkus in Action, Author: Martin Stefanko
Title: Applied Data Science Using PySpark: Learn the End-to-End Predictive Model-Building Cycle, Author: Ramcharan Kakarla
Title: Cyber Security: Law and Guidance, Author: Helen Wong MBE
Title: AI in and for Africa: A Humanistic Perspective, Author: Susan Brokensha
Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin
Title: Go in Practice, Second Edition, Author: Nathan Kozyra
Title: Bioinformatics: Drug Discovery, Author: Anil K. Sharma
Title: Discover Everyday Artificial Intelligence: Streamline Your Life And Skill Set with AI, Author: Jerry J. Pisel Jr.
Title: Cloud Native Go: Building Reliable Services in Unreliable Environments, Author: Matthew A Titmus

Pagination Links