The Esoteric Philosophy of Love and Marriage
Dion Fortune
The Transformation of American Abolitionism: Fighting Slavery ...
Richard S. Newman
Change Management in Nonprofit Organizations: Theory and Practice
Kunle Akingbola & Sean Edmund Rogers & Alina Baluch
Value Added Heat Map: Eine Methode zur Visualisierung von Wertschöpfung
Dagmar Piotr Tomanek & Jürgen Schröder
10 Foundation (91)
Psychosemantics - Review
Daniel Clement Dennett
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Grokking Web Application Security
Malcolm McDonald
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Hacking for Dummies
Kevin Beaver
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Kali Linux Penetration Testing Bible
Gus Khawaja
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Crypto Dictionary
Jean-Philippe Aumasson