Title: Data Integrity: The Science, The Regulations, The Use, Author: Richard Siconolfi
Title: Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, Author: Cathy O'Neil
Title: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win, Author: Gene Kim
Title: Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything, Author: Michio Kaku
Title: Digital Minimalism: Choosing a Focused Life in a Noisy World, Author: Cal Newport
Title: Getting started with Adobe Acrobat Pro, Author: Rémy Lentzner
Title: Blockchain Explained: Your Ultimate Guide to the Tokenization of Finance, Author: Peter Gaffney
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: ITIL Foundation Essentials ITIL 4 Edition - The ultimate revision guide, Author: Claire Agutter
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: AP Computer Science Principles Premium, 2025: Prep Book with 6 Practice Tests + Comprehensive Review + Online Practice, Author: Barron's Educational Series
Title: Automate the Boring Stuff with Python, 3rd Edition, Author: Al Sweigart
Title: Some Future Day: How AI Is Going to Change Everything, Author: Marc Beckman
Title: Practical Augmented Reality: A Guide to the Technologies, Applications, and Human Factors for AR and VR, Author: Steve Aukstakalnis
Title: Learn Java the Easy Way: A Hands-On Introduction to Programming, Author: Bryson Payne
Title: Cybersecurity for Beginners, Author: Raef Meeuwisse
Title: The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win, Author: Gene Kim bestselling author of The
Title: Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS, Author: Travis Plunk
Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level, Author: Paul Huijbregts

Pagination Links