Contemporary Abstract Algebra
Joseph Gallian
Expert T-SQL Window Functions in SQL Server 2019: The Hidden ...
Kathi Kellenberger & Clayton Groom & Ed Pollack
CRC Concise Encyclopedia of Mathematics, Second Edition
Eric W. Weisstein
Fullstack GraphQL
Roy Derks & Gaetano Checinski
CAPE syllabus, specimen paper and mark scheme- Integrated mathematics ...
Caribbean Examinations Council
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena
Advanced API Security: The Definitive Guide to API Security
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
ASP.NET Core Security
Christian Wenz
Beginning Ethical Hacking With Python
Sanjib Sinha
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Crypto Dictionary
Jean-Philippe Aumasson
Cryptography for Internet and Database Applications
Nick Galbreath
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer