15 Secrets Successful People Know About Time Management: The ...
Kevin Kruse
H. G. Wells – Gesammelte Werke: Die Zeitmaschine, Der Krieg ...
H. G. Wells
The Hidden Hand
Richard H. Immerman
All Change: Project Manager's Secret Handbook
Eddie Obeng
Learning Python for Forensics: Leverage the Power of Python ...
Preston Miller & Chapin Bryce
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cryptography for Internet and Database Applications
Nick Galbreath
Crypto Dictionary
Jean-Philippe Aumasson