Note On Performative Acts Of Violence [Essay]
Judith P. Butler
Machine Learning With Python: A Practical Beginners' Guide
Oliver Theobald
Management and Organisational Behaviour
Laurie J. Mullins
Encyclopedia of Politics
Rodney P. Carlisle
After Shock: The World's Foremost Futurists Reflect on 50 Years ...
John Schroeter & Ray Kurzweil
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Grokking Web Application Security
Malcolm McDonald
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm