Set Theory: A First Course
Daniel W. Cunningham
Current Trends in Database Technology - EDBT 2004 Workshops: ...
Athena Vakali & Wolfgang Lindner & Marco Mesiti & Can Türker & Yannis Tzitzikas
Lecture Notes in Computer Science (3268)
Cloud Computing: Concepts, Technology, Security, and Architecture
Thomas Erl & Eric Monroy
The Innovator's Dilemma: When New Technologies Cause Great Firms ...
Clayton M. Christensen
More Entrepreneurial Living: 16 More Stories of Innovation, ...
Jennifer Harrolle & Stephen R. C. Hicks
Linux Security Fundamentals
David Clinton
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With OAuth 2.0
Ryan Boyd
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Hacking for Dummies
Kevin Beaver
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Crypto Dictionary
Jean-Philippe Aumasson
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner