Title: Securing Cloud Native Apps, Author: Michael Anderson Pre-Order Now
Title: Linux Basics for Hackers, 2nd Edition, Author: OccupyTheWeb Pre-Order Now
Title: SharePoint For Dummies, Author: Rosemarie Withee Pre-Order Now
Title: Cybersecurity For Dummies, Author: Joseph Steinberg Pre-Order Now
Title: Open Radio Access Network (O-RAN) Systems Architecture and Design, Author: Wim Rouwet BSc Pre-Order Now
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle Pre-Order Now
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan Pre-Order Now
Title: Metasploit, 2nd Edition, Author: David Kennedy Pre-Order Now
Title: Exam Ref DP-300 Administering Microsoft Azure SQL Solutions, Author: Craig Zacker Pre-Order Now
Title: Networking All-in-One For Dummies, Author: Doug Lowe Pre-Order Now
Title: Cyber Threat Hunting, Author: Nadhem AlFardan Pre-Order Now
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski Pre-Order Now
Title: Principles of Inductive Near Field Communications for Internet of Things, Author: Johnson I. Agbinya Pre-Order Now
Title: The Connectivity of Things: Network Cultures since 1832, Author: Sebastian Giessmann Pre-Order Now
Title: Street Computing: Urban Informatics and City Interfaces, Author: Marcus Foth Pre-Order Now
Title: Secret History: The Story of Cryptology, Author: Craig P. Bauer Pre-Order Now
Title: Advances in SIoT (Social Internet of Things), Author: Gururaj H L Pre-Order Now
Title: Internet of Behaviors (IoB), Author: R. Dhaya Pre-Order Now
Title: Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints, Author: Jinling Liang Pre-Order Now
Title: Opportunistic Networks: Fundamentals, Applications and Emerging Trends, Author: Anshul Verma Pre-Order Now

Pagination Links