Towards the Internet of Things: Architectures, Security, and ...
Mohammad Ali Jabraeil Jamali & Bahareh Bahrami & Arash Heidari & Parisa Allahverdizadeh & Farhad Norouzi
Monolith to Microservices
Sam Newman
In the Shadow of Violence: Politics, Economics, and the Problems ...
Douglass C. North & John Joseph Wallis & Steven B. Webb & Barry R. Weingast
Who Was Michael Jackson?
Megan Stine & Who Hq
American Psycho
Bret Easton Ellis
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Grokking Web Application Security
Malcolm McDonald
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Penetration Testing for Dummies
Robert Shimonski