The Economist
calibre
Red Hat Enterprise Linux 8 Administration
Miguel Pérez Colino , Pablo Iranzo Gómez , Scott McCarty
365 Inspirational Quotes
MIKE ROBBINS
Women on Wheels
April Streeter
Responsive Security
Kang, Meng-Chow
Ethical Hacking and Penetration Testing Guide
Unknown
socialmediawarfare
Threat Level Red: Cybersecurity Research Programs of the U.S. ...
Michael Erbschloe
Big Data Analytics in Cybersecurity
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
Unauthorized Access
Sloan, Robert H.; Warner, Richard
Iris Biometric Model for Secured Network Access
Khoury, Franjieh El
Intrusion Detection Networks
Carol Fung & Raouf Boutaba
Computer Security Literacy
Jacobson, Douglas; Idziorek, Joseph
Web Security
Hanqing Wu, Liz Zhao
Security Strategy
Bill Stackpole & Eric Oksendahl
Information Security Fundamentals
Peltier, Thomas R.
Security De-Engineering
Ian Tibble
Defense against the Black Arts
Varsalone, Jesse; McFadden, Matthew
Network and Data Security for Non-Engineers
Frank M. Groom & Kevin Groom & Stephan S. Jones
wallingouttheinsi[..]
bigdataanalyticsw[..]
collaborativecybe[..]
dataanalyticsfori[..]
supplychainriskma[..]
intrusiondetectio[..]
cisojourney
understandingthen[..]