The Girl With the Phony Name
Charles Mathes
How to Talk to Absolutely Anyone: Confident Communication for ...
Mark Rhodes
Blessing the Hands That Feed Us: Lessons From a 10-Mile Diet
Vicki Robin
The New PhD: How to Build a Better Graduate Education
Leonard Cassuto & Robert Weisbuch
CISA Certified Information Systems Auditor Study Guide: Covers ...
Peter H. Gregory & Mike Chapple
ISC2 CISSP Certified Information Systems Security Professional ...
Mike Chapple & David Seidl
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
TLS Mastery
Michael W. Lucas
IT Mastery (16)
Linux Server Security: Hack and Defend
Chris Binnie
Cloud Native Security
Chris Binnie & Rory McCune
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Elastix Unified Communications Server Cookbook
Gerardo Barajas Puente
Learning Nessus for Penetration Testing
Himanshu Kumar