Title: Confident Cyber Security: The Essential Insights and How to Protect from Threats, Author: Jessica Barker
Title: Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, Author: Christopher J Hodson
Title: Enterprise Security Architecture: A Business-Driven Approach, Author: Nicholas Sherwood
Title: Oracle Cloud Infrastructure - A Guide to Building Cloud Native Applications, Author: Jeevan Joseph
Title: People-Centric Security: Transforming Your Enterprise Security Culture, Author: Lance Hayden
Title: Inverse Problems and Data Assimilation, Author: Daniel Sanz-Alonso
Title: CASP+ CompTIA Advanced Security Practitioner Practice Tests: Exam CAS-004, Author: Nadean H. Tanner
Title: Argus Developer in Practice: Real Estate Development Modeling in the Real World, Author: Tim M. Havard
Title: Needs Assessment for Organizational Success, Author: Roger Kaufman
Title: Android Security Internals: An In-Depth Guide to Android's Security Architecture, Author: Nikolay Elenkov
Title: Designing Cloud Data Platforms, Author: Danil Zburivsky
Title: Programming-Based Formal Languages and Automata Theory: Design, Implement, Validate, and Prove, Author: Marco T. Morazán
Title: Radical Technologies: The Design of Everyday Life, Author: Adam Greenfield
Title: Analysis of Boolean Functions, Author: Ryan O'Donnell
Title: Affect and Artificial Intelligence, Author: Elizabeth A. Wilson
Title: Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies, Author: Craig P. Bauer
Title: ARM Microprocessor Systems: Cortex-M Architecture, Programming, and Interfacing, Author: Muhammad Tahir
Title: Trillions: Thriving in the Emerging Information Ecology, Author: Peter Lucas
Title: Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers, Author: Aaron Roberts
Title: Docker for Rails Developers: Build, Ship, and Run Your Applications Everywhere, Author: Rob Isenberg

Pagination Links