Creativity, Inc.: Overcoming the Unseen Forces That Stand in ...
Ed Catmull & Amy Wallace
Schaum's Outline of Mathematica®, 2ed
Eugene Don
Schaum's Outline Series (1)
Truth Considered and Applied: Examining Postmodernism, History, ...
Stewart E. Kelly
Determining 911 Regulatory Compliance - Understanding risk requires ...
Irwin Lazar
An Introduction to the Philosophy of Religion
Michael J. Murray & Michael C. Rea
Grokking Web Application Security
Malcolm McDonald
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
The Private Production of Defense
Hans-Hermann Hoppe
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Penetration Testing for Dummies
Robert Shimonski