The Unexpected Leader: Discovering the Leader Within You
Jacqueline M. Baker
Memory Detection: Theory and Application of the Concealed Information ...
Bruno Verschuere & Gershon Ben-Shakhar & Ewout Meijer
Research Methods in Applied Linguistics: Quantitative, Qualitative, ...
Zoltan Dörnyei
Elbow Room: The Varieties of Free Will Worth Wanting by Daniel ...
Arthur C. Danto
Corpus Linguistics in Literary Analysis Jane Austen and her ...
Unknown
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cryptography for Internet and Database Applications
Nick Galbreath
Crypto Dictionary
Jean-Philippe Aumasson