Machine Understanding: Machine Perception and Machine Perception ...
Zbigniew Les & Magdalena Les
Learning to See: Value Stream Mapping to Add Value and Eliminate ...
John Shook & Mike Rother & Jim Womack & Dan Jones
The Archetypes and the Collective Unconscious - Altermate Version
Carl Gustav Jung
The Bourne Identity
Robert Ludlum
Encyclopedia of Television Shows, 1925 Through 2007
Vincent Terrace
Beginning Ethical Hacking With Python
Sanjib Sinha
Network Troubleshooting Tools
Joseph Sloan
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Getting Started With OAuth 2.0
Ryan Boyd
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Advanced API Security: OAuth 2.0 and Beyond
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux