The Gulf War Did Not Take Place
Jean Baudrillard
Progress and Poverty
Henry S. George
An Islamic Philosophy of Virtuous Religions: Introducing Alfarabi
Joshua Parens
Three Contributions to the Theory of Sex
Sigmund Freud
Data Visualization with Python and JavaScript
Kyran Dale
Getting Started With OAuth 2.0
Ryan Boyd
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Managing the Internet of Things: Architectures, Theories and ...
Jun Huang & Kun Hua
Worried About the Wrong Things: Youth, Risk, and Opportunity ...
Jacqueline Ryan Vickery
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Spatial Computing
Shashi Shekhar & Pamela Vold
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Cybersecurity for Dummies
Joseph Steinberg
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner