Title: The Hack Is Back: Techniques to Beat Hackers at Their Own Games, Author: Jesse Varsalone
Title: The Kubernetes Book, Author: Nigel Poulton
Title: Integrated Assurance: Unified Risk Strategy, Author: Patrick Hayes
Title: Introduction to Artificial Intelligence and Machine Learning, with eBook Access Code, Author: R. Kelly Rainer
Title: The Human Face of Big Data, Author: Rick Smolan
Title: A Hands-On Introduction to Data Science, Author: Chirag Shah
Title: The Esri Guide to GIS Analysis, Volume 3: Modeling Suitability, Movement, and Interaction, Author: Andy Mitchell
Title: Securing Systems: Applied Security Architecture and Threat Models, Author: Brook S. E. Schoenfield
Title: CIO Paradox: Battling the Contradictions of It Leadership, Author: Martha Heller
Title: The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques, Author: Thomas R. Peltier
Title: Information Economics, Author: Urs Birchler
Title: Guided Inquiry: Learning in the 21st Century, Author: Carol C. Kuhlthau
Title: Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, Author: Mubashir Husain Rehmani
Title: Web Information Systems Engineering - WISE 2015: 16th International Conference, Miami, FL, USA, November 1-3, 2015, Proceedings, Part I, Author: Jianyong Wang
Title: Device-to-Device based Proximity Service: Architecture, Issues, and Applications, Author: Yufeng Wang
Title: Integrated Assurance: Unified Risk Strategy, Author: Patrick Hayes
Title: 5G: The 5th Generation Mobile Networks, Author: Ulrich Trick
Title: Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, Author: Heru Susanto
Title: Technology In Action Complete, Author: Alan Evans
Title: Cyberspace and Cybersecurity, Author: George Kostopoulos

Pagination Links