Corporate Performance Management: ARIS in Practice
August-Wilhelm Scheer & Wolfram Jost & Andreas Kronz & Helge Heß
The Deliberate Dumbing Down of America: A Chronological Paper ...
Charlotte Thompson Iserbyt
Analysis I
Herbert Amann & Joachim Escher
Analysis Series from Herbert Amann and Joachim Escher (1)
Unreported Truths About Covid-19 and Lockdowns: Combined Parts ...
Alex Berenson
Philosophy, Rhetoric, and Thomas Hobbes
Timothy Raylor
Grokking Web Application Security
Malcolm McDonald
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Hacking for Dummies
Kevin Beaver
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Kali Linux Penetration Testing Bible
Gus Khawaja
Linux Security Fundamentals
David Clinton
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr