Title: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win, Author: Gene Kim
Title: Windows Server 2022 & PowerShell All-in-One For Dummies, Author: Sara Perrott
Title: Microsoft Azure For Dummies, Author: Jack A. Hyman
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: iPhone 16 Pro Max Digital Photography: The Unofficial Mini-Guide iOS 18 Edition, Author: Jason Rich
Title: CISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans, Author: Richie Miller
Title: Networking Is a Contact Sport: How Staying Connected and Serving Others Will Help You Grow Your Business, Expand Your Influence -- or Even Land Your Next Job, Author: Joe Sweeney
Title: iPhone 16 Pro Max User Manual: The Complete Step-By-Step Guide to Maximize your New iPhone 16 Pro Max and iOS 18, Author: Charles A. Craig
Title: Cybersecurity for Beginners: Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams, Author: Michael Patel
Title: The Ultimate Baofeng Radio Survival Guide: A Complete Guerrilla's Handbook to Effortlessly Master Communication and Safeguard Your Loved Ones in Any Crisis - Stay Connected When it Matters Most, Author: Jackson R. Thorne
Title: Applied Embedded Electronics: Design Essentials for Robust Systems, Author: Jerry Twomey
Title: Threat Modeling, Author: Izar Tarandach
Title: Hands-On MQTT Programming with Python: Work with the lightweight IoT protocol in Python, Author: Gaston C. Hillar
Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid, Author: Seth Enoka
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: The Sovereign Individual: Mastering the Transition to the Information Age, Author: James Dale Davidson
Title: Part Two: Unifying Continuous Performance Management and Insider Threat Prevention Cyber Security (The Psychology of Insider Threat Prevention, #2), Author: Raymond Newkirk
Title: Data Driven: Profiting from Your Most Important Business Asset, Author: Thomas C. Redman
Title: Social Engineering: The Science of Human Hacking, Author: Christopher Hadnagy

Pagination Links