pythonroboticspro[..]
Unknown
professionallinux[..]
Ferdinand Beck
Training Guide 2.0
How to Make Hand-Drawn Maps
Helen Cann
Web Security
Hanqing Wu, Liz Zhao
wallingouttheinsi[..]
understandingthen[..]
Unauthorized Access
Sloan, Robert H.; Warner, Richard
Threat Level Red: Cybersecurity Research Programs of the U.S. ...
Michael Erbschloe
supplychainriskma[..]
socialmediawarfare
Security Strategy
Bill Stackpole & Eric Oksendahl
Security De-Engineering
Ian Tibble
Responsive Security
Kang, Meng-Chow
Network and Data Security for Non-Engineers
Frank M. Groom & Kevin Groom & Stephan S. Jones
Iris Biometric Model for Secured Network Access
Khoury, Franjieh El
intrusiondetectio[..]
Intrusion Detection Networks
Carol Fung & Raouf Boutaba
Information Security Fundamentals
Peltier, Thomas R.
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
Ethical Hacking and Penetration Testing Guide
Defense against the Black Arts
Varsalone, Jesse; McFadden, Matthew
dataanalyticsfori[..]
Computer Security Literacy
Jacobson, Douglas; Idziorek, Joseph
collaborativecybe[..]
cisojourney
bigdataanalyticsw[..]
Big Data Analytics in Cybersecurity