How to Be a Stoic
Massimo Pigliucci
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven ...
Deepak Gupta & Aditya Khamparia
Approaches and Methods in Language Teaching: A Description and ...
Jack Croft Richards & Theodore S. Rodgers
The Smear: How Shady Political Operatives and Fake News Control ...
Sharyl Attkisson
Knowledge Creation, Diffusion, and Use in Innovation Networks ...
Elias G. Carayannis & David Campbell
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Grokking Web Application Security
Malcolm McDonald
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner