Unity® Virtual Reality Development with VRTK4: A No-Coding Approach ...
Christopher Coutinho
Mathematica® for Bioinformatics
George Mias
Developing Leaders by Executive Coaching: Practice and Evidence
Andromachi Athanasopoulou & Sue Dopson
Philosophy as a Humanistic Discipline
Bernard Arthur Owen Williams & Bernard Williams
Knowledge Representation: Logical, Philosophical, and Computational ...
Stewart C. Schapiro
Beginning Ethical Hacking With Python
Sanjib Sinha
Network Troubleshooting Tools
Joseph Sloan
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Getting Started With OAuth 2.0
Ryan Boyd
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Advanced API Security: OAuth 2.0 and Beyond
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux