Tubes: A Journey to the Center of the Internet
Andrew Blum
Audra Taylor - GET YOUR PERIOD Handbook
GET YOUR PERIOD Handbook
The Economist
calibre
The Modern Enneagram
Kacie Berghoef & Melanie Bell
understandingthen[..]
Unknown
cisojourney
intrusiondetectio[..]
supplychainriskma[..]
dataanalyticsfori[..]
collaborativecybe[..]
bigdataanalyticsw[..]
wallingouttheinsi[..]
Network and Data Security for Non-Engineers
Frank M. Groom & Kevin Groom & Stephan S. Jones
Defense against the Black Arts
Varsalone, Jesse; McFadden, Matthew
Security De-Engineering
Ian Tibble
Information Security Fundamentals
Peltier, Thomas R.
Security Strategy
Bill Stackpole & Eric Oksendahl
Web Security
Hanqing Wu, Liz Zhao
Computer Security Literacy
Jacobson, Douglas; Idziorek, Joseph
Intrusion Detection Networks
Carol Fung & Raouf Boutaba
Iris Biometric Model for Secured Network Access
Khoury, Franjieh El
Unauthorized Access
Sloan, Robert H.; Warner, Richard
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
Big Data Analytics in Cybersecurity
Threat Level Red: Cybersecurity Research Programs of the U.S. ...
Michael Erbschloe
socialmediawarfare
Ethical Hacking and Penetration Testing Guide
Responsive Security
Kang, Meng-Chow