Dictionary of Environmental Law
Alan Gilpin
Docker for Sysadmins: Linux Windows VMware
Nigel Poulton
React Router Quick Start Guide: Routing in React Applications ...
Sagar Ganatra
The Tao of Physics: An Exploration of the Parallels Between ...
Fritjof Capra
DMT Handbook - Everything about the craziest drug in the world, ...
Christopher Rottmann
Penetration Testing for Dummies
Robert Shimonski
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
The Private Production of Defense
Hans-Hermann Hoppe
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Kali Linux Penetration Testing Bible
Gus Khawaja
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Grokking Web Application Security
Malcolm McDonald
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer