AI-Generated Popular Culture: A Semiotic Perspective
Marcel Danesi
Your Essential Guide to Sustainable Investing: How to Live Your ...
Larry E. Swedroe & Samuel C Adams
Gluten-Free Artisan Bread in Five Minutes a Day
Zoë François & Jeff Hertzberg, M.D.
Crawfish Bottom: Recovering a Lost Kentucky Community
Douglas Boyd
Kentucky Remembered: An Oral History Series (1)
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Data Stewardship: An Actionable Guide to Effective Data Management ...
David Plotkin
Federated Identity Primer
Derrick Rountree
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Joe Celko’s Complete Guide to NoSQL: What Every SQL Professional ...
Joe Celko
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk