Agile Project Management with Scrum
Ken Schwaber
William Blake in the Desolate Market
G. E. Bentley Jr
The Language of Propositions and Events
Alessandro Zucchi
The Journey Into Wholeness: A Jungian Guide to Discovering the ...
Bud Harris
American Crusades: The Rise and Fulfillment of the Protestant ...
Jon Depriest
Linux Security Fundamentals
David Clinton
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With OAuth 2.0
Ryan Boyd
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Hacking for Dummies
Kevin Beaver
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Crypto Dictionary
Jean-Philippe Aumasson
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner