The Book of Secrets of Albertus Magnus: Of the Virtues of Herbs, ...
Michael R. Best & Frank H. Brightman
Islamic Philosophy of Religion: Synthesis of Science Religion ...
J. I. Laliwala
Python Testing with Pytest
Brian Okken
The Adventure of the Second Stain
Arthur Conan Doyle
The Return of Sherlock Holmes (13)
Risiko Deutschland
Joschka Fischer
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cybersecurity for Dummies
Joseph Steinberg
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Spatial Computing
Shashi Shekhar & Pamela Vold
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Worried About the Wrong Things: Youth, Risk, and Opportunity ...
Jacqueline Ryan Vickery
Managing the Internet of Things: Architectures, Theories and ...
Jun Huang & Kun Hua
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Getting Started With OAuth 2.0
Ryan Boyd