Title: American Black Chamber, Author: Herbert O. Yardley
Title: Information Dashboard Design: Displaying Data for At-a-Glance Monitoring / Edition 2, Author: Stephen Few
Title: Making Things Happen: Mastering Project Management / Edition 1, Author: Scott Berkun
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice / Edition 2, Author: Jason Andress
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics / Edition 74, Author: N. Katherine Hayles
Title: Requirements Engineering Fundamentals: A Study Guide for the Certified Professional for Requirements Engineering Exam - Foundation Level - IREB compliant / Edition 2, Author: Klaus Pohl
Title: Building Blockchain Apps / Edition 1, Author: Michael Yuan
Title: Cybernetic Revolutionaries: Technology and Politics in Allende's Chile, Author: Eden Medina
Title: Twenty Lectures on Algorithmic Game Theory, Author: Tim Roughgarden
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement / Edition 2, Author: Luc Perkins
Title: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, Author: Evan Wheeler
Title: Cultivating Communities of Practice: A Guide to Managing Knowledge, Author: Etienne Wenger
Title: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy / Edition 2, Author: Patrick Engebretson Ph.D.
Title: Learning to Fly, with free online content: Practical Knowledge Management from Leading and Learning Organizations / Edition 2, Author: Chris Collison
Title: Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, Author: Deviant Ollam
Title: IT Governance: How Top Performers Manage IT Decision Rights for Superior Results, Author: Peter Weill

Pagination Links