Business Data Science: Combining Machine Learning and Economics to Optimize, Automate, and Accelerate Business Decisions
QuickBooks for Restaurants: A Bookkeeping and Accounting Guide: A Must-Have QuickBooks Guide for Restaurant Owners and Operators
The Chief Data Officer Handbook for Data Governance
Windows 10: 2020 Updatеd Usеr Guidе to Mastеr Microsoft Windows 10 with 33 Latеst Tips and Tricks .
Learning the vi and Vim Editors
TinyML: Machine Learning with TensorFlow Lite on Arduino and Ultra-Low-Power Microcontrollers
Virus Hunter: Thirty Years of Battling Hot Viruses Around the World
Learn Excel 2019 Essential Skills with The Smart Method: Tutorial for self-instruction to beginner and intermediate level
Linux for Beginners: Introduction to Linux and its Variants, from Mint to Kali, from Debian to Ubuntu. Guide to Command Lines and uses for Information Security and Hacking
Beyond Cybersecurity: Protecting Your Digital Business
Python Machine Learning - Second Edition: Machine Learning and Deep Learning with Python, scikit-learn, and TensorFlow
Casino and Gaming Resort Investigations
SonarQube in Action
Microsoft Project 2016 Quick Reference Guide Creating a Basic Project - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
ServiceNow Development Handbook - Second Edition: A compendium of pro-tips, guidelines, and best practices for ServiceNow developers
Information Security Governance Simplified: From the Boardroom to the Keyboard
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
R For Marketing Research and Analytics (Use R!)
Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and ... such as Programmable Logic Controllers (PLC)
I Forgot to Remember: 4x6 Small Internet Password Logbook Organizer with Tabs | Flower Dark Purple Design
macOS Mojave: The Missing Manual: The book that should have been in the box
Cracking The Website Code: Grow Your Own Online Business Faster With A Smarter Website and Savvy Marketing
Speech and Language Processing, 2nd Edition
Excel: Pivot Tables & Charts (Quick Study Computer)
Microsoft Project 2013 Step by Step
Python Penetration Testing Cookbook: Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
Shelly Cashman Series Discovering Computers & Microsoft Office 365 & Office 2016: A Fundamental Combined Approach
The Practice of Programming (Addison-Wesley Professional Computing Series)
BSD Hacks
The Model Thinker: What You Need to Know to Make Data Work for You
Financial Modeling (The MIT Press)
Business Continuity Management System: A Complete Guide to Implementing ISO 22301
Algebraic Function Fields and Codes (Graduate Texts in Mathematics)
Security without Obscurity: A Guide to Cryptographic Architectures
Windows Server 2016 Inside Out (includes Current Book Service)
Essential MATLAB for Engineers and Scientists
Security Awareness: Applying Practical Security in Your World
The Truthful Art: Data, Charts, and Maps for Communication (Voices That Matter)
Hacking Etico 101 - Cómo hackear profesionalmente en 21 días o menos!: 2da Edición. Revisión 2018. (Spanish Edition)
Cybersecurity for Beginners: 25 MOST COMMON SECURITY THREATS & HOW TO AVOID THEM
Learn Adobe Photoshop CC for Visual Design: Adobe Certified Associate Exam Preparation (2nd Edition) (Adobe Certified Associate (ACA))
Windows 10: New 2020 Complete User Guide to Learn Microsoft Windows 10 with 580 Tips & Tricks. November Update Included .
PMP® Exam Prep Fully Updated for July 2020 Exam: Technical Project Manager
Photoshop for Lightroom Users (2nd Edition) (Voices That Matter)
EXCEL 2019: Explore the powerful Formulas and Functions of Excel 2019
Hacking: Networking and Security (2 Books in 1: Hacking with Kali Linux & Networking for Beginners)
Windows Server® 2008 PKI and Certificate Security (PRO-Other)
New Perspectives Microsoft Office 365 & Excel 2016: Comprehensive
Adobe Photoshop CC Classroom in a Book (2018 release)
Beginning Programming All-In-One Desk Reference For Dummies
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private
Web of Deceit: Misinformation and Manipulation in the Age of Social Media
Adobe Photoshop CC Classroom in a Book (2019 Release)
Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics, Vol. 3)
Software-Defined Networking and Security: From Theory to Practice (Data-Enabled Engineering)
Microsoft Office 365 Essentials Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
SPSS for Research Methods: A Basic Guide
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Guide to Wireless Network Security
IBM i Security Administration and Compliance
C++ Coding Standards: 101 Rules, Guidelines, and Best Practices
Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between
The Black Scorpion Pilot: A Ford Stevens Military-Aviation Thriller (Book 2)
Agile Retrospectives: Making Good Teams Great
Microsoft Silverlight Edition: Programming Windows Phone 7 (Developer Reference)
AI in Cybersecurity (Intelligent Systems Reference Library)
C# in Depth
Design Patterns: Elements of Reusable Object-Oriented Software
CEH Certified Ethical Hacker All-in-One Exam Guide
Technology for Success and Illustrated Series™ Microsoft Office 365 & Office 2019 (MindTap Course List)
Concepts of Database Management
Police Corruption: Preventing Misconduct and Maintaining Integrity (Advances in Police Theory and Practice)
One Creepy Street: The Spider on the Web
Ultimate DFIR Cheats! X-Ways Forensics
100 Life-Changing Tips Using Microsoft Office for Windows
Max Power: Check Point Firewall Performance Optimization
Pocket Password Book (Foal Play): A discreet password log book for people who love horses (Disguised Password Book Series)
The Java Programming Language, 4th Edition
Internet Password Organizer: Secret Garden (Discreet Password Journal)
COMPUTER PROGRAMMING: 4 books in 1: SQL for Beginners, C# for Beginners, C# for Intermediate, Hacking with Kali Linux, Everything you Need for Mastering Programming & Cyber Security
Learn Arts & Letters 7.0: The Offical Guide (Wordware Arts & Letters Library)
Accounting Information Systems
Take Back Your Life! Using Microsoft Office Outlook to Get Organized and Stay Organized
Information Theory, Inference and Learning Algorithms
Adobe Illustrator CC Classroom in a Book (2018 release)
Make Your Smartphone 007 Smart: NEW 2018 Edition
Running Linux: A Distribution-Neutral Guide for Servers and Desktops
FISMA Compliance Handbook: Second Edition
The Encrypted Book of Passwords
Microsoft Word 2019 Step by Step
Password Log: An Internet Address and Password Journal (Squares)
Scrivener For Dummies
Active Directory: Designing, Deploying, And Running Active Directory
Exam Ref MD-100 Windows 10
Cracking the Coding Interview, Fourth Edition: 150 Programming Interview Questions and Solutions
The Adobe Photoshop Lightroom Classic CC Book (2nd Edition)
PowerPoint Basics In 30 Minutes: How to make effective PowerPoint presentations using a PC, Mac, PowerPoint Online, or the PowerPoint app
The Adobe Photoshop Lightroom Classic CC Book for Digital Photographers (Voices That Matter)
Getting Started with the Photon: Making Things with the Affordable, Compact, Hackable WiFi Module (Make: Technology on Your Time)
100 Things Every Designer Needs to Know About People (Voices That Matter)
Network Security Auditing (Cisco Press Networking Technology Series)
Advanced Maya Texturing and Lighting
PMP® Exam Prep - July 2020 updates: New Eugenics Solar Car Planet Colonization
OneNote Secrets: 100 Tips for OneNote 2013 and 2016
How to Complete a Risk Assessment in 5 Days or Less
The Art of R Programming: A Tour of Statistical Software Design
Democracy Hacked: Political Turmoil and Information Warfare in the Digital Age
Mastering QuickBooks 2020: The ultimate guide to bookkeeping and QuickBooks Online
Lpi Linux Certification in a Nutshell (In a Nutshell (O'Reilly))
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH)
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection
Design for How People Learn (2nd Edition) (Voices That Matter)
Hacking Exposed Mobile: Security Secrets & Solutions
Hacking For Beginners: The Ultimate Guide To Becoming A Hacker
Ultimate DFIR Cheats! X-Ways Forensics
The Doom Hacker's Guide
Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras
The Robosapien Companion: Tips, Tricks, and Hacks (Technology in Action)
Microsoft Excel 2016 Step by Step
Microsoft Excel 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
The Codebreakers: The story of secret writing
Making Things Happen: Mastering Project Management (Theory in Practice)
Password Log Book: Account And Password Book, Password Directory Personal, Internet Password Organizer, Password Notebook Organizer, Music Lover Cover (Volume 1)
MCSA SQL 2016 BI Development Exam Ref 2-pack: Exam Refs 70-767 and 70-768
Office 2019 For Dummies (For Dummies (Computer/Tech))
Password Journal: Password Keeper / Owl Gifts ( Internet Address Logbook / Diary / Softback Notebook ) [ Carnival ] (Password Journals - Animals)
Learn Power BI: A beginner's guide to developing interactive business intelligence solutions using Microsoft Power BI
Windows 10 Made Easy: Take Control of Your PC (Computers Made Easy)
HACKING: Rooting & Jailbreaking
Windows 10 Inside Out (3rd Edition)
The Enterprise Big Data Lake: Delivering the Promise of Big Data and Data Science
This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
Excel Basics In 30 Minutes (2nd Edition): The quick guide to Microsoft Excel and Google Sheets
Troubleshooting CentOS
Pro Apache (Expert's Voice)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions
The Future of Ideas: The Fate of the Commons in a Connected World
Windows Forensics Cookbook
High Performance Spark: Best Practices for Scaling and Optimizing Apache Spark
Intellectual Property and Open Source: A Practical Guide To Protecting Code
Business Object Design and Implementation: OOPSLA'95 Workshop Proceedings
Neural Networks in a Softcomputing Framework
Better Presentations: A Guide for Scholars, Researchers, and Wonks
Mastering Active Directory: Understand the Core Functionalities of Active Directory Services Using Microsoft Server 2016 and PowerShell
Data for the People: How to Make Our Post-Privacy Economy Work for You
CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)
Blockchain Science: Distributed Ledger Technology
Hacking Innovation: The New Growth Model from the Sinister World of Hackers
Microsoft Power BI Quick Start Guide: Build dashboards and visualizations to make your data come to life
Cyber Security: The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Adobe Photoshop Lightroom Classic For Dummies
Adobe Illustrator CC Classroom in a Book (2019 Release)
Programming Industrial Strength Windows: Shrink-Wrap Your App!
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Analyzing Financial Data and Implementing Financial Models Using R (Springer Texts in Business and Economics)
Practical Vim: Edit Text at the Speed of Thought
Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe
Excel 2019 For Dummies
Practical Mobile Forensics - Second Edition
Cryptology (Spectrum)
Statistical Analysis with R For Dummies (For Dummies (Computers))
The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright (Information Society Series)
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: Foundation Learning for the CCNP TSHOOT 642-832
Hacking!: 3 Books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with Kali Linux
The Mathematics of Ciphers: Number Theory and RSA Cryptography
Algorithm Design
Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private
Using SPSS for Windows and Macintosh (7th Edition)
Production Planning and Control (SAP PP) with SAP ERP (2nd Edition) (SAP PRESS)
Microsoft SharePoint 2013 Step by Step
Hash Crack: Password Cracking Manual (v2)
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
Office 2019 All-in-One For Dummies (Office All-in-one for Dummies)
HTML & XHTML: The Definitive Guide (6th Edition)
Supercharge Power BI: Power BI Is Better When You Learn to Write DAX
Microservices Patterns: With examples in Java
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
VLSI Design and Test for Systems Dependability
Troubleshooting with the Windows Sysinternals Tools
Excel Data Analysis For Dummies (For Dummies (Computer/Tech))
Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide (2nd Edition) (Foundation Learning Guides)
Burn Your Portfolio: Stuff They Don't Teach You in Design School, But Should (Voices That Matter)
Managing Projects with Gnu Make (Nutshell Handbooks)
Lean Software Development: An Agile Toolkit
The Hacker Crackdown
Intermediate Excel (Excel Essentials)
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL
Teach Yourself VISUALLY Office 2016 (Teach Yourself VISUALLY (Tech))
MATLAB: A Practical Introduction to Programming and Problem Solving
Plagued: The CEO's Ultimate Guide to HIPAA Compliance and Cybersecurity
Applied Artificial Intelligence: A Handbook For Business Leaders
Cyber Fraud: Tactics, Techniques and Procedures
The Deep-sky Imaging Primer, Second Edition
Optical Document Security with CDROM (Artech House Optoelectronics Library)
The Little SAS Book: A Primer, Sixth Edition
Essential PHP Security
Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series)
Shit I Forgot Again Internet Address and Password Logbook: Alphabetized Password Manager Notebook for Username, Website Login and Email | Alphabetical ... Vault Diary, Keeper Journal and Tracker
Password Keeper: Your Personal Password Journal Perfect Purple
Learn Python Programming: The no-nonsense, beginner's guide to programming, data science, and web development with Python 3.7, 2nd Edition
Windows 10 In 3o minutes (2020 Edition): The Ultimate user guide, How to master Windows 10 includes November, 2019 update
Password Journal: Password Keeper / Gifts - Leopard Print ( Internet Address Logbook / Diary / Notebook ) (Password Journals - Animal Print)
Learning the bash Shell: Unix Shell Programming (In A Nutshell (O'reilly))
MyLab IT with Pearson eText -- Access Card -- for GO! with Microsoft Office 365, 2019 Edition
Adobe InDesign CC Classroom in a Book (2019 Release)
ASP.NET Core 3 and React: Hands-On full stack web development using ASP.NET Core, React, and TypeScript 3
VMware vSphere 6.7 Data Center Design Cookbook: Over 100 practical recipes to help you design a powerful virtual infrastructure based on vSphere 6.7, 3rd Edition
Autodesk Civil 3D 2020: Fundamentals (Imperial Units): Autodesk Authorized Publisher
Windows 10 Introduction Quick Reference Guide (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated) Updated Aug 2019
Microsoft Office 2019 Inside Out
Skulls & Anatomy: Copyright Free Vintage Illustrations for Artists and Designers
QuickBooks for Contractors (QuickBooks How to Guides for Professionals)
CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902)
Penetration Testing: Network & Perimeter Testing (EC-Council Press)
Excel All-in-One For Dummies: The Ultimate Guide to Learn Excel Formulas and Functions with Pro Excel Programming Strategies
Core Software Security: Security at the Source
Being Digital
Group Policy: Fundamentals, Security, and the Managed Desktop
BackTrack 5 Wireless Penetration Testing Beginner's Guide
Facebook: The Top 100 Best Ways To Use Facebook For Business, Marketing, & Making Money (Social Media Facebook Business Online Marketing Sales Strategies 1)
Networking for Beginners: Easy Guide to Learn Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet and Cyber Security
Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents
Exploring Microsoft Office Access 2016 Comprehensive (Exploring for Office 2016 Series)
CCNA Security 640-554 Official Cert Guide
The Photoshop Toolbox: Essential Techniques for Mastering Layer Masks, Brushes, and Blend Modes
Translucent Databases 2Nd Edition: Confusion, Misdirection, Randomness, Sharing, Authentication And Steganography To Defend Privacy
101 Excel 2013 Tips, Tricks and Timesavers
Security Controls Evaluation, Testing, and Assessment Handbook
Apache Security
The Design of RijndaeL: AES - The Advanced Encryption Standard (Information Security and Cryptography)
HACKING: Rooting & Jailbreaking
The Essence of COM: A Programmer's Workbook (3rd Edition) (Prentice Hall Ptr Microsoft Technologies Series,)
Pandas Cookbook: Recipes for Scientific Computing, Time Series Analysis and Data Visualization using Python
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Computer and Information Security Handbook
Security+ Guide to Network Security Fundamentals
IBM SPSS Statistics 23 Step by Step: A Simple Guide and Reference
Windows Nt Server 4.0 McSe Study Guide
Advanced Concepts in Defensive Tactics: A Survival Guide for Law Enforcement
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Hacking with Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including Linux Basics and Command Lines
Microsoft Excel 2016 Functions & Formulas Quick Reference Card - Windows Version (4-page Cheat Sheet focusing on examples and context for ... functions and formulas - Laminated Guide)
QuickBooks 2019 For Dummies (For Dummies (Computer/Tech))
CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
Exam Ref AZ-900 Microsoft Azure Fundamentals
Microsoft Project 2016 Quick Reference Guide Managing Complexity - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
Excel 2016 Power Programming with VBA (Mr. Spreadsheet's Bookshelf)
Understanding GIS: An ArcGIS Pro Project Workbook
NETWORKING HACKING: Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware.
Leading Exponential Change: Go beyond Agile and Scrum to run even better business transformations
Learn Excel 2019 Essential Skills with The Smart Method: Tutorial for self-instruction to beginner and intermediate level
Intermediate Statistics Using SPSS
Python Playground: Geeky Projects for the Curious Programmer
Database Reliability Engineering: Designing and Operating Resilient Database Systems
OS X Incident Response: Scripting and Analysis
Microsoft SharePoint 2013 Planning for Adoption and Governance
Digital Forensics for Handheld Devices
NetSuite ERP for Administrators: Learn how to install, maintain, and secure a NetSuite implementation, using the best tools and techniques
The Idealist
Word 2016 For Dummies
The C Answer Book: Solutions to the Exercises in 'The C Programming Language,' Second Edition
SAP System Security Guide (SAP PRESS)
Internet Password Journal: A-Z list Personal Internet Address Organizer | Internet Address and Password Logbook | Modern Abstract Design
Computer Basics Absolute Beginner's Guide, Windows 10 Edition (9th Edition)
Computers Made Easy: From Dummy To Geek
Hands-On Ethical Hacking and Network Defense
IP SUBNETTING FOR DUMMIES: 7 Steps To Understand IP Subnetting In Simple Terms, Bonus Subnetting Calculator
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center
Juniper MX Series
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Smalltalk Best Practice Patterns
PowerPoint 2019 For Dummies (Powerpoint for Dummies)
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
Microsoft Project 2019 Step by Step (Step by Step (Microsoft))
Microsoft Access 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
OpenVPN Cookbook - Second Edition
SQL Server Forensic Analysis
Applied Combinatorics
To Catch a Predator: Protecting Your Kids from Online Enemies Already in Your Home
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
CompTIA Network+ Certification Premium Bundle: All-in-One Exam Guide, Seventh Edition with Online Access Code for Performance-Based Simulations, Video Training, and Practice Exams (Exam N10-007)
Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking
Matlab: A Practical Introduction to Programming and Problem Solving
The Psychology of Information Security
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
Adobe InDesign CC: A Complete Course and Compendium of Features
Software Engineering: The Current Practice (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
Network Security Architectures (Networking Technology)
Basic Security Testing with Kali Linux
Mastering FreeBSD and OpenBSD Security
Beginning Power BI: A Practical Guide to Self-Service Data Analytics with Excel 2016 and Power BI Desktop
Presenting Data Effectively: Communicating Your Findings for Maximum Impact
Windows 10 Plain & Simple (2nd Edition)
Hacking With Kali Linux: The Step-By-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
Password Log Book: Internet Password Address Book, Password Lock Journal, Password Book, Password-Internet Book, Minimalist Grey Cover (Volume 17)
Google Drive & Docs in 30 Minutes (2nd Edition): The unofficial guide to the new Google Drive, Docs, Sheets & Slides
Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science
New Perspectives on Computer Concepts 2018: Comprehensive
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) (Certification Press)
Learning Visual Basic .Net
FreeBSD Device Drivers: A Guide for the Intrepid
Leading Issues in Information Warfare Research
R Packages
Sql Cookbook (Cookbooks (O'Reilly))
Workbook for Cognitive Skills: Exercises for Thought Processing and Word Retrieval, Second Edition, Revised and Updated (William Beaumont Hospital Series in Speech and Language Pathology)
Google Hacking for Penetration Testers, Volume 1
Microsoft Visio 2016 Step By Step
Fixing Your Scrum: Practical Solutions to Common Scrum Problems
Hands-On Start to Wolfram Mathematica: And Programming with the Wolfram Language
Excel Tips & Tricks (Quick Study Computer)
Designing Voice User Interfaces: Principles of Conversational Experiences
On Cyber: Towards an Operational Art for Cyber Conflict
sed & awk
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Intrusion Signatures and Analysis
The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World
The Landscape Photographer's Guide to Photoshop: A Visualization-Driven Workflow
New Perspectives Microsoft Office 365 & Excel 2016: Intermediate
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger
Computer Forensics Library Boxed Set
Windows 10 All-In-One For Dummies
Cybersecurity for Everyone: Securing your home or small business network
Network+ Guide to Networks
Adobe Illustrator CC For Dummies
Microsoft Office 2016 Essentials Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
User Stories Applied: For Agile Software Development
System Center Configuration Manager Current Branch Unleashed
Power Pivot and Power BI: The Excel User's Guide to DAX, Power Query, Power BI & Power Pivot in Excel 2010-2016
Linux Forensics
Excel 2019 All-in-One For Dummies
QuickBooks Practice Set: QuickBooks Experience using Realistic Transactions for Accounting, Bookkeeping, CPAs, ProAdvisors, Small Business Owners or other users
Microsoft Excel 2016 2013 2010 2007 Tips Tricks and Shortcuts (Color Version): Learn Formulas, Functions and Formatting in 20 Mini-Lessons (Easy Learning Microsoft How-To Books) (Volume 2)
The Definitive Guide to DAX: Business intelligence for Microsoft Power BI, SQL Server Analysis Services, and Excel Second Edition (Business Skills)
Running QuickBooks in Nonprofits: 2nd Edition: The Only Comprehensive Guide for Nonprofits Using QuickBooks
Salesforce Advanced Administrator Certification Guide: Become a Certified Advanced Salesforce Administrator with this exam guide
Linux Driver Development for Embedded Processors - Second Edition: Learn to develop Linux embedded drivers with kernel 4.9 LTS
Handbook of Biometrics
Introducing MATH! Grade 2 by ArgoPrep: 600+ Practice Questions + Comprehensive Overview of Each Topic + Detailed Video Explanations Included | 2nd Grade Math Workbook
Excel 2016 Bible
Windows Server 2019 & PowerShell All-in-One For Dummies (For Dummies (Computer/Tech))
MOS 2016 Study Guide for Microsoft Word (MOS Study Guide)
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Networking for Beginners: An Easy Guide to Learning Computer Network Basics. Take Your First Step, Master Wireless Technology, the OSI Model, IP Subnetting, Routing Protocols and Internet Essentials.
Outlier Analysis
Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library
The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios
CEH Certified Ethical Hacker Bundle, Third Edition (All-in-One)
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Shit I Can't Remember: Internet Password Log Book Organizer Password Keeper | Small Password Log Book with Large Print | 5" x 8" | 150 Pages | Brown
Beyond Fear: Thinking Sensibly About Security in an Uncertain World.
PAM Mastery (IT Mastery Book 10)
CCNA Routing and Switching ICND2 200-101 Official Cert Guide
Monolith to Microservices: Evolutionary Patterns to Transform Your Monolith
Windows 10 May 2019 Update: The Missing Manual: The Book That Should Have Been in the Box
GO! with Office 2016 Volume 1 (GO! for Office 2016 Series) - Standalone book
The Giant Black Book of Computer Viruses
Learning iOS Forensics - Second Edition
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Hacking: The Art of Exploitation, 2nd Edition
Fire Doesn't Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
How Do I Do That in Photoshop?: The Quickest Ways to Do the Things You Want to Do, Right Now!
8th Grade Common Core Math: Daily Practice Workbook | 1000+ Practice Questions and Video Explanations | Argo Brothers
Parenting in the Digital World: A Step-by-Step Guide to Internet Safety
Head First Design Patterns: A Brain-Friendly Guide
99 Things You Wish You Knew Before...Your Identity Was Stolen
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Windows Performance Analysis Field Guide
Windows 10: The Missing Manual: The book that should have been in the box
Microsoft Power BI Complete Reference: Bring your data to life with the powerful features of Microsoft Power BI
Alexa For Dummies
Logo Design Love: A Guide to Creating Iconic Brand Identities, 2nd Edition
SQL All-In-One For Dummies, 3rd Edition (For Dummies (Computer/Tech))
SSL and TLS: Designing and Building Secure Systems
Election Attitude: How Internet Voting Leads to a Stronger Democracy (It's All About Attitude)
Trusted Platform Modules: Why, when and how to use them (Computing and Networks)
Data Science: A Comprehensive Beginner’s Guide to Learn the Realms of Data Science
QuickBooks Pro 2019 Quick Reference Training Card - Laminated Tutorial Guide Cheat Sheet (Instructions and Tips)
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Police Corruption: Preventing Misconduct and Maintaining Integrity (Advances in Police Theory and Practice)
Defense against the Black Arts
The Decision to Attack: Military and Intelligence Cyber Decision-Making (Studies in Security and International Affairs Ser.)
SharePoint For Dummies (For Dummies (Computer/Tech))
Fierce: Discreet Internet Website Password Logbook, Large Print Book, 8 1/2" x 11"
Cybercrime and the Law: Challenges, Issues, and Outcomes
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
Learn Excel 2016 Expert Skills with The Smart Method: Courseware Tutorial teaching Advanced Techniques
Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert
Parent Alert: How to Keep Your Kids Safe Online
Hands-On Programming with R: Write Your Own Functions And Simulations
Introducing MATH! Grade 5 by ArgoPrep: 600+ Practice Questions + Comprehensive Overview of Each Topic + Detailed Video Explanations Included | 5th Grade Math Workbook
C Programming: A Modern Approach, 2nd Edition
A Law Enforcement Sourcebook of Asian Crime and CulturesTactics and Mindsets
Cryptography and E-Commerce: A Wiley Tech Brief
The Ultimate Unofficial Guide to Strategies for Minecrafters: Everything You Need to Know to Build, Explore, Attack, and Survive in the World of Minecraft
Networking Basics: The Complete Guide on Internet Protocols and OSI Model. Includes a Useful Section about Wireless Home Networking.
Computer Service and Repair
Dropbox In 30 Minutes (2nd Edition): The Beginner's Guide To Dropbox Backup, Syncing, And Sharing
Collect, Combine, and Transform Data Using Power Query in Excel and Power BI (Business Skills)
CISA Certified Information Systems Auditor Study Guide
The Sketchnote Handbook: the illustrated guide to visual note taking
Learn Excel 2016 Essential Skills with The Smart Method: Courseware tutorial for self-instruction to beginner and intermediate level
Using QuickBooks Online for Accounting (with Online, 6 month Printed Access Card)
Murach's Mainframe COBOL
Complete Guide to Internet Privacy, Anonymity & Security
Malware Forensics: Investigating and Analyzing Malicious Code
Exchange Server 2016: The Administrator's Reference
The Art of Deception: Controlling the Human Element of Security
Cybercrime and Cybersecurity in the Global South (International Political Economy Series)
Introduction to Modern Number Theory: Fundamental Problems, Ideas and Theories (Encyclopaedia of Mathematical Sciences)
Creating Business Applications with Office 365: Techniques in SharePoint, PowerApps, Power BI, and More
SSCP Systems Security Certified Practitioner Practice Exams
Deep Learning and the Game of Go
Windows 10 In Depth (includes Content Update Program) (2nd Edition)
Information Security Governance: Framework and Toolset for CISOs and Decision Makers
Learn System Center Configuration Manager in a Month of Lunches
The Accidental Instructional Designer: Learning Design for the Digital Age
Network Forensics
Guide to the De-Identification of Personal Health Information
Photoshop CC: Visual QuickStart Guide (2015 release)
Gamestorming: A Playbook For Innovators, Rulebreakers, And Changemakers
Networking All-in-One For Dummies
Discovering Statistics Using IBM SPSS Statistics, 4th Edition
Know Your Enemy: Learning about Security Threats (2nd Edition)
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet
Cloud Foundry: The Definitive Guide: Develop, Deploy, and Scale
Sit Back and Relax: 4x6 Small Notebook for Password with Alphabetical Tabs | Floral Design Black
Adobe Illustrator Classroom in a Book (2020 release)
New Perspectives Microsoft Office 365 & Office 2019 Introductory (MindTap Course List)
Waging Cyber War: Technical Challenges and Operational Constraints
MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using
Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
4th Grade Common Core Math: Daily Practice Workbook - Part II: Free Response | 1000+ Practice Questions and Video Explanations | Argo Brothers
Practical Internet of Things Security
Infrastructure as Code
3D Printer Projects for Makerspaces
Digital SLR Photography All-in-One For Dummies (For Dummies (Computers))
Excel 2010 For Dummies
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Enterprise IoT: Strategies and Best Practices for Connected Products and Services
SAP Sales and Distribution Quick Configuration Guide: Advanced SAP Tips and Tricks with Variant Configuration (Color Edition Book)
Programming .Net Security
Exam Ref AZ-203 Developing Solutions for Microsoft Azure
Internet Password Organizer: The Cat's Meow (Discreet Password Journal)
Encyclopedia of Cyber Warfare
Software Quality Assurance: Integrating Testing, Security, and Audit (Internal Audit and IT Audit)
Computer and Information Security Handbook
UML Distilled: A Brief Guide to the Standard Object Modeling Language
Mindf\*ck
Building Virtual Pentesting Labs for Advanced Penetration Testing
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux
Practical Statistics for Data Scientists: 50 Essential Concepts
Quantum Cryptography and Secret-Key Distillation
Beginner's Guide to Digital Painting in Photoshop
Raspberry Pi Projects For Dummies
Java Concurrency in Practice
Reversing: Secrets of Reverse Engineering
Introduction to Evolutionary Informatics
Cybersecurity: A Business Solution: An executive perspective on managing cyber risk
MATLAB For Beginners: A Gentle Approach
Workplace Violence: Issues in Threat Management
Foundations of Cryptography: Volume 1, Basic Tools
Fundamentals of Speaker Recognition
CompTIA A+ Practice Tests: Exam 220-901 and Exam 220-902
Malware: Fighting Malicious Code
Head First Java, 2nd Edition
Practical Digital Forensics
Cybercon: Protecting Ourselves from Big Tech & Bigger Lies
Post-Quantum Cryptography
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Large-Scale C++ Volume I: Process and Architecture (Addison-Wesley Professional Computing Series)
Hands-On Motion Graphics with Adobe After Effects CC: Develop your skills as a visual effects and motion graphics artist
SAP Plant Maintenance (SAP PM): Business User Guide (4th Edition) (SAP PRESS)
Agile Project Management with Kanban (Developer Best Practices)
Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (Lecture Notes in Computer Science)
Secure and Resilient Software Development
Hacking with Kali Linux: The Complete Guide to Kali Linux and the Art of Exploitation, Basic Security, Wireless Network Security, Ethical Hacking and Penetration Testing for Beginners
Structure and Interpretation of Computer Programs - 2nd Edition (MIT Electrical Engineering and Computer Science)
Java Messaging (Programming Series)
Worried About the Wrong Things: Youth, Risk, and Opportunity in the Digital World (The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning)
Guide to Wireless Network Security
Microsoft Office 365 Administration Inside Out (Includes Current Book Service) (2nd Edition)
MCSA Windows Server 2016 Exam Ref 3-Pack: Exams 70-740, 70-741, and 70-742
Software Estimation: Demystifying the Black Art (Developer Best Practices)
Hacking Exposed Web Applications, 3rd Edition
Windows Home Networking Made Easy: Home and Small Office Connectivity (Computers Made Easy)
Protecting Information: From Classical Error Correction to Quantum Cryptography
Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)
PowerPoint 2016 For Dummies
CEH Certified Ethical Hacker Bundle, Second Edition (All-in-One)
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation
Hyperledger Cookbook: Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools
Neural Networks and Deep Learning: A Textbook
SolarWinds Orion Network Performance Monitor
PowerShell for Office 365: Automate Office 365 administrative tasks
Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
After Effects Apprentice: Real-World Skills for the Aspiring Motion Graphics Artist (Apprentice Series)
What Is Computer Science?: An Information Security Perspective (Undergraduate Topics in Computer Science)
Handbook of Elliptic and Hyperelliptic Curve Cryptography (Discrete Mathematics and Its Applications)
Hacking with Kali Linux: The Complete Guide to Kali Linux and the Art of Exploitation, Basic Security, Wireless Network Security, Ethical Hacking and Penetration Testing for Beginners
Data Analytics for Internal Auditors (Internal Audit and IT Audit)
Web Scalability for Startup Engineers
Java Security Handbook
Internet Password Organizer: Password Journal To Protect Usernames & Passwords |Password Keeper| The Personal Internet Address (Perfect Binding) |6" x 9",100 Pages (Volume 1)
Microsoft Excel Data Analysis and Business Modeling (5th Edition)
Salesforce Lightning Platform Enterprise Architecture: Architect and deliver packaged applications that cater to enterprise business needs, 3rd Edition
PowerPoint 2019 Reference and Cheat Sheet: The unofficial cheat sheet reference for Microsoft PowerPoint 2019
Official (ISC)2 Guide to the CSSLP ((ISC)2 Press)
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Exploring Microsoft Office 2016 Volume 1 (Exploring for Office 2016 Series)
Administering Windows Server 2012 R2: Exam 70-411 (Microsoft Official Academic Course)
Adopt & Embrace Microsoft Teams: A manager's guide to communication, collaboration and coordination with Microsoft Teams
CISSP Study Guide
Statistical Analysis with Excel For Dummies
Microsoft Outlook 2016 Mail, Calendar, People, Tasks, Notes Quick Reference - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Guide)
Introduction to Biometrics
Head First SQL: Your Brain on SQL -- A Learner's Guide
The Unix Programming Environment (Prentice-Hall Software Series)
Adobe Photoshop CC for Photographers 2018
Writing Information Security Policies
Getting Started with Tableau 2019.2: Effective data visualization and business intelligence with the new features of Tableau 2019.2, 2nd Edition
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Hacking with Kali Linux: Penetration Testing: A Beginner's Guide with Practical Examples to Learn How to Efficiently Perform Web Penetration Techniques, Exposing Vulnerabilities by Server Attacks
Programming Pearls
Excel 2016 All-In-One For Dummies
Hacking Wireless Networks - The ultimate hands-on guide
QuickBooks Pro 2018 Quick Reference Training Card - Laminated Tutorial Guide Cheat Sheet (Instructions and Tips)
Industrial Espionage and Technical Surveillance Counter Measurers
Microsoft SharePoint 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions & Tips - Laminated Card)
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk Management, Social Engineering, and Information Security.
Teach Yourself VISUALLY PowerPoint 2016 (Teach Yourself VISUALLY (Tech))
Great Demo!: How To Create And Execute Stunning Software Demonstrations
Googled: The End of the World as We Know It
How to Cheat at IT Project Management
Backup & Recovery: Inexpensive Backup Solutions For Open Systems
Malicious Cryptography: Exposing Crytovirology
MIPS Assembly Language Programming
Designing BSD Rootkits: An Introduction to Kernel Hacking
Complex Network Analysis in Python: Recognize - Construct - Visualize - Analyze - Interpret
Project 2016 For Dummies
Pandas Cookbook: Recipes for Scientific Computing, Time Series Analysis and Data Visualization using Python
macOS High Sierra: The Missing Manual: The book that should have been in the box
Teach Yourself VISUALLY Excel 2016 (Teach Yourself VISUALLY (Tech))
Confessions of a Public Speaker (English and English Edition)
Mixed Effects Models and Extensions in Ecology with R (Statistics for Biology and Health)
Van Gogh Notebook: Internet Password Jotter - Discreet Password Book with Tabs - Disguised Password Organizer Logbook with Alphabetical Pages - Log Book to Store Passwords
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Mastering Windows PowerShell Scripting: Automate and manage your environment using PowerShell Core 6.0, 3rd Edition
Dark Pools: The Rise of the Machine Traders and the Rigging of the U.S. Stock Market
Information Security for Managers
Data Structures and Algorithms in Java (2nd Edition)
Excel 2016 For Dummies (For Dummies (Computers))
CMPTR (with CMPTR Online, 1 term (6 months) Printed Access Card) (New, Engaging Titles from 4LTR Press)
Secrets of the JavaScript Ninja
Strategic Writing for UX: Drive Engagement, Conversion, and Retention with Every Word
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
An Introduction to DDoS Attacks and Defense Mechanisms: An Analyst's Handbook
Microsoft Excel 2019 Pivot Table Data Crunching (Business Skills)
Beyond the Valley: How Innovators around the World are Overcoming Inequality and Creating the Technologies of Tomorrow (The MIT Press)
Exploiting Software: How to Break Code: How to Break Code
Cissp Official (Isc)2 Practice Tests
Discovering Statistics Using R
Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems
Exam Ref AZ-300 Microsoft Azure Architect Technologies
The Grammar of Graphics (Statistics and Computing)
Microsoft Excel 2019 Inside Out
Hardening Linux
GDPR: Guiding Your Business To Compliance: A practical guide to meeting GDPR regulations. (Edition 2)
Eleventh Hour CISSP: Study Guide
CSS: The Missing Manual
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
Password Log: (An Internet Address and Password Journal)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
An Introduction to Statistical Learning: with Applications in R (Springer Texts in Statistics)
Construction Management JumpStart 2nd Edition
Hacking For Dummies (For Dummies (Computer/Tech))
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition
SharePoint Online from Scratch: Office 365 SharePoint from basics to advanced
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Applied Cryptanalysis: Breaking Ciphers in the Real World
C: A Reference Manual, 5th Edition
Thinking in Java (4th Edition)
Investigations in the Workplace
Sustainable Facility Management: Operational Strategies for Today
Database Internals: A Deep Dive into How Distributed Data Systems Work
Burp Suite Essentials
To Be a Machine: Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving the Modest Problem of Death
NIST Special Publication 800-53 (rev 4): Security and Privacy Controls for Federal Information Systems and Organizations
Microsoft PowerPoint 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
Practical Deep Learning for Cloud, Mobile, and Edge: Real-World AI & Computer-Vision Projects Using Python, Keras & TensorFlow
Attack and Defend Computer Security Set
Scrum Mastery: From Good to Great Servant-Leadership
The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Networking
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
Business Intelligence Guidebook: From Data Integration to Analytics
Windows 10 Simplified
Cybersecurity: Geopolitics, Law, and Policy
Version Control with Git: Powerful Tools And Techniques For Collaborative Software Development
Introduction to Management Science: A Modeling and Case Studies Approach with Spreadsheets
Cybercrime & the Dark Net
200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline
Effective C++: 55 Specific Ways to Improve Your Programs and Designs (Professional Computing)
Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures
The Ask Leo! Guide to Staying Safe on the Internet - Expanded 4th Edition: Keep Your Computer, Your Data, And Yourself Safe on the Internet
Risk Analysis and Security Countermeasure Selection
Security and Loss Prevention: An Introduction
School Security: How to Build and Strengthen a School Safety Program
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Graph Algorithms: Practical Examples in Apache Spark and Neo4j
Cybersecurity for the Home and Office: The Lawyer's Guide to Taking Charge of Your Own Information Security
Microsoft Windows 10 Tips & Tricks (Quick Study Computer)
Hands-On Machine Learning with Microsoft Excel 2019: Build complete data analysis flows, from data collection to visualization
SAP Transaction Codes: Your Quick Reference to T-Codes in SAP ERP (SAP PRESS)
PCI Compliance, Version 3.2: The Latest on PCI DSS Compliance
Dynamic SQL: Applications, Performance, and Security
Learning Spark: Lightning-Fast Big Data Analysis
Analyzing Data with Power BI and Power Pivot for Excel (Business Skills)
Introductory Statistics Using SPSS
Mobile Ad Hoc Networking
Seeds of Reprisal: Monsanto vs. Michael White
Mastering Adobe Photoshop Elements: Excel in digital photography and image editing for print and web using Photoshop Elements 2019
Beginner's Guide to Digital Painting in Photoshop: Characters
Locksmithing and Electronic Security Wiring Diagrams
R in Action: Data Analysis and Graphics with R
Adobe Photoshop Lightroom Classic CC - The Missing FAQ (Version 7/2018 Release): Real Answers to Real Questions Asked by Lightroom Users
The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition (2nd Edition)
OneNote 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
CompTIA Network+ Certification All-in-One Exam Guide, 5th Edition (Exam N10-005)
The Book of GIMP: A Complete Guide to Nearly Everything
Code Breaking: A History and Exploration
Access 2019 Bible
Project Management Using Microsoft Project 2016: A Training and Reference Guide for Project Managers Using Standard, Professional, Server, Web Application and Project Online for Office 365
Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
VoIp Hacks: Tips & Tools For Internet Telephony
Solving Cyber Risk: Protecting Your Company and Society
Student Data Privacy
Modern C++ Design: Generic Programming and Design Patterns Applied
The Splinters of our Discontent: How to Fix Social Media and Democracy Without Breaking Them
Getting Started with the Graph Template Language in SAS: Examples, Tips, and Techniques for Creating Custom Graphs
Access 2016 Bible
Data Visualization: A Practical Introduction
Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)
Information Fusion for Cyber-Security Analytics (Studies in Computational Intelligence)
Hacking for Beginners: A step by step guide to learn the concept of Ethical Hacking. How to use the essential command line, Penetration testing and basic security
Learn Windows PowerShell in a Month of Lunches
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
Unauthorised Access: Physical Penetration Testing For IT Security Teams
IT Governance: An International Guide to Data Security and ISO27001/ISO27002
Excel Formulas (Quick Study Computer)
Office 365 All-in-One For Dummies (For Dummies (Computer/Tech))
Computer Accounting With Quickbooks 2018
Effective Data Visualization: The Right Chart for the Right Data
Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders
The Psychology of Information Security
The Data Science Design Manual (Texts in Computer Science)
Types and Programming Languages (The MIT Press)
Hacking with Kali Linux: Wireless Penetration: A Beginner's Guide with Practical Examples to Learn to Create a Wireless Lab for Experiments, Sniff Out ... Networks and Attack Authentication Systems
Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System
Prometheus: Up & Running: Infrastructure and Application Performance Monitoring
On Privacy Matters: A Citizen's Guide to Modern Technology
cyber 24-7: Risks, Leadership, Sharing: Sound advice for the Board, C-Suite, and non-technical executives
The Book of Inkscape: The Definitive Guide to The Free Graphics Editor
Mastering GUI Programming with Python: Develop impressive cross-platform GUI applications with PyQt
Beginning PowerApps: The Non-Developers Guide to Building Business Mobile Applications
MOS 2016 Study Guide Microsoft Access (MOS Study Guide)
Illustrated Microsoft Office 365 & Office 2016 Projects, Loose-leaf Version
Insider Threat: Prevention, Detection, Mitigation, and Deterrence
Instant OSSEC Host-based Intrusion Detection System
C# 7.0 in a Nutshell: The Definitive Reference
Code Complete: A Practical Handbook of Software Construction, Second Edition
Articulate Storyline 3 & 360: The Essentials
Microsoft Excel 2016 Tables, PivotTables, Sorting, Filtering & Inquire Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Microsoft Access 2019 Programming by Example with VBA, XML, and ASP
Cleantech Con Artists: A True Vegas Caper
Scalability Rules: 50 Principles for Scaling Web Sites
Financial Modeling in Excel For Dummies
Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World (Praeger Security International)
Hacking Wireless Networks - The ultimate hands-on guide
Lean B2B: Build Products Businesses Want
Microsoft Excel 2019 Step by Step
Coding Freedom: The Ethics and Aesthetics of Hacking
Cloud FinOps: Collaborative, Real-Time Cloud Financial Management
Mr. Robot and Philosophy: Beyond Good and Evil Corp (Popular Culture and Philosophy)
Building the Web of Things: With examples in Node.js and Raspberry Pi
Listening In: Cybersecurity in an Insecure Age
Writing Effective Use Cases (Crystal Series for Software Development)
Office 2016 Simplified
Training Law Enforcement Officers
Microsoft Word 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
Microsoft Project 2016 Step by Step
Designing Bots: Creating Conversational Experiences
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition
SQL: Access to SQL Server
Fundamentals of Communications and Networking (Jones & Bartlett Learning Information Systems Security & Assurance)
Tricks of the Unix Masters (The Waite Group)
QuickBooks: A Basic Guide to Learn the Principles of Bookkeeping and Accounting for Beginners
Linux For Beginners: A Step-By-Step Guide to Learn Linux Operating System + The Basics of Kali Linux Hacking by Command Line Interface. Tools Explanation and Exercises Included
Classic Shell Scripting
Cyber-Physical Attacks: A Growing Invisible Threat
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing
Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World
Office 2016 All-In-One For Dummies
macOS Catalina: The Missing Manual: The Book That Should Have Been in the Box
R for Data Science: Import, Tidy, Transform, Visualize, and Model Data
Networking for Beginners: Easy Guide to Learn Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet and Cyber Security
How to Keep Your Stuff Safe Online
Engineering with Excel (5th Edition)
Contextual Design: Design for Life (Interactive Technologies)
Internet Password Organizer: Patriot (Discreet Password Journal)
Agile Software Development, Principles, Patterns, and Practices
Microsoft Office 2016 Step by Step
CISSP: A Comprehensive Beginner’s Guide to Learn the Fundamentals of Information System Security for CISSP Exam
Windows 10 For Dummies, 3rd Edition (For Dummies (Computer/Tech))
Schrödinger's Killer App: Race to Build the World's First Quantum Computer
Windows Internals, Part 1 (Developer Reference)
The Hacker Crackdown
Understanding Computers: Today and Tomorrow: Comprehensive
Microsoft 365 Business for Admins For Dummies (For Dummies (Computer/Tech))
Agile Software Development with Scrum (Series in Agile Software Development)
Big Data: Principles and best practices of scalable realtime data systems
Administer and Secure Enterprise Linux: Red Hat and CentOS versions 7 and 8
Learn QuickBooks Desktop Pro 2019 DVD-ROM Training Tutorial Course- Video Lessons, Printable Instruction Manual, Quiz, Final Exam and Certificate of Completion
Applied Predictive Modeling
People-Centric Security: Transforming Your Enterprise Security Culture
Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet
Gregg College Keyboarding & Document Processing (GDP); Lessons 1-120, main text
Playing Smarter in a Digital World: A Guide to Choosing and Using Popular Video Games and Apps to Improve Executive Functioning in Children and Teens
Managing Security with Snort and IDS Tools
Mastering Product Management: A Step-by-Step Guide
Mastering the AS/400: A Practical Hands-On Guide, Third Edition
CISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z
Google Apps Made Easy: Learn to work in the cloud (Computers Made Easy Book 7)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Speech and Language Processing, 2nd Edition
Mastering Ethereum: Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols
Secure Operations Technology
The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture
Beginning Office 365 Collaboration Apps: Working in the Microsoft Cloud
Basic GIS Coordinates, Second Edition
Exam AZ-300 & AZ-301 Study & Lab Guide Part 1: Microsoft Certified Azure Solutions Architect Expert
C# Cookbook
CSSLP Certification All-in-One Exam Guide
Windows PowerShell Pocket Reference: Portable Help for PowerShell Scripters (Pocket Reference (O'Reilly))
Applied Cryptanalysis: Breaking Ciphers in the Real World
The Hack-Proof Password System: Protect Yourself Online With a Memory Expert's In-Depth Guide to Remembering Passwords
How to Hack a Human: Cybersecurity for the Mind
Arduino For Dummies
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
ITIL For Beginners: The Complete Beginner's Guide to ITIL
QuickBooks for Churches & Other Religious Organizations (Accountant Beside You)
Kali Linux Cookbook - Second Edition: Effective penetration testing solutions
The Muvipix.com Guide to Adobe Premiere Elements 2020: The tools, and how to use them, to make movies on your personal computer
Shelly Cashman Series Microsoft Office 365 & Office 2016: Introductory
Learn PowerShell Scripting in a Month of Lunches
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies
Elementary Cryptanalysis: A Mathematical Approach (Mathematical Association of America Textbooks)
The Healing Power of Trees: Spiritual Journeys Through the Celtic Tree Calendar
Securing DevOps: Security in the Cloud
Cybersecurity: Home and Small Business
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity
Visual Analytics with Tableau
Windows 10 Fundamentals November 2019 Edition: The Step-by-step Guide to Using Windows 10 (Computer Fundamentals)
Mastering Python Forensics: Master the art of digital forensics and analysis with Python
Advanced Apex Programming in Salesforce
Password Notebook: 6x9 Internet Login Journal Medium with Alphabetical Tabs | Large Print | Pastel Bird Floral Design Pink
I Forgot to Remember: 4x6 Small Internet Password Logbook Organizer with Tabs | Flower Black Design
The Little SAS Book: A Primer, Fifth Edition
SELinux System Administration - Second Edition
pfSense Essentials: The Complete Reference to the pfSense Internet Gateway and Firewall
The Ruby Programming Language
Shit I Forgot Again Internet Address and Password Logbook: Alphabetized Password Manager Notebook for Username, Website Login and Email | Alphabetical ... Vault Diary, Keeper Journal and Tracker
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
The little handbook of Windows Forensics: Just some random thoughts about Windows Forensics
Mastering Bitcoin 101: How to Start Investing and Profiting from Bitcoin, Blockchain, and Cryptocurrency Technologies Today
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python
The Basics of Web Hacking: Tools and Techniques to Attack the Web
Hacking For Dummies (For Dummies (Computer/tech))
Crime and Intelligence Analysis
CEH v9: Certified Ethical Hacker Version 9 Kit
Word 2016 For Professionals For Dummies (For Dummies (Computers))
Doing Math with Python: Use Programming to Explore Algebra, Statistics, Calculus, and More!
Introductory Statistics with R (Statistics and Computing)
SAS® Certified Specialist Prep Guide: Base Programming Using SAS® 9.4
Modern Authentication with Azure Active Directory for Web Applications (Developer Reference)
Extreme Programming Explained: Embrace Change, 2nd Edition (The XP Series)
Test Driven Development: By Example
Cyber Security Essentials
Exam Ref 70-742 Identity with Windows Server 2016
Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Safety Critical Computer Systems
The BIGGER Book of Apps: Your Nerdy BFF’s Guide to (Almost) Every App in the Universe
Defensive Tactics for Today’s Law Enforcement
Discover QGIS 3.x: A Workbook for Classroom or Independent Study
A Guide to Kernel Exploitation: Attacking the Core
Safeguarding Intangible Assets
Hadoop Security: Protecting Your Big Data Platform
iWork: The Missing Manual (Missing Manuals)
Tourism Security: Strategies for Effectively Managing Travel Risk and Safety
Networking For Beginners: Learn Basic Computer Networking Concepts, What A Computer Network Is And What Are The Different Types Of Networks. (Hacking)
Mastering Windows Network Forensics and Investigation
Cybersecurity Exposed: The Cyber House Rules
Exam Ref MD-101 Managing Modern Desktops
Hacking with Kali Linux: The Ultimate Beginners Guide for Learning Kali Linux to Understand Wireless Network & Penetration Testing. Including how to Getting Started with Scripting, and Security
Understanding the Linux Kernel, Third Edition
Codebreaker: The History of Codes and Ciphers
Hacking Wireless 101: ¡Cómo hackear redes inalámbricas fácilmente! (Volume 2) (Spanish Edition)
Adobe Photoshop CC 2019 Introduction Quick Reference Guide (4-page Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
Google BigQuery: The Definitive Guide: Data Warehousing, Analytics, and Machine Learning at Scale
Lean Mastery Collection: 8 Manuscripts: Lean Six Sigma, Lean Startup, Lean Enterprise, Lean Analytics, Agile Project Management, Kanban, Scrum, Kaizen
Excel Formulas & Functions For Dummies
Microeconometrics Using Stata: Revised Edition
Differential Equations and Boundary Value Problems: Computing and Modeling (5th Edition) (Edwards, Penney & Calvis, Differential Equations: Computing and Modeling Series)
Elementary Cryptanalysis (Anneli Lax New Mathematical Library)
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide
überhacker II: More Ways to Break Into a Computer (No.2)
Secure Multiparty Computation and Secret Sharing
A Hacker Manifesto
SAP HANA Security Guide (SAP PRESS)
MP Loose Leaf Computer Accounting with QuickBooks 2018
Microsoft Windows Intune 2.0: Quickstart Administration
Hacking with Kali Linux: The Complete Guide on Kali Linux for Beginners and Hacking Tools. Includes Basic Security Testing with Kali Linux
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Microsoft Excel 2016 Advanced & Macros Quick Reference Guide - Windows Version (Cheat Sheet of Instructions, Tips & Shortcuts - Laminated Card)
Hands-on Incident Response and Digital Forensics
Extrusion Detection: Security Monitoring for Internal Intrusions
On Cyber: Towards an Operational Art for Cyber Conflict
Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations, Third Edition
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition
Implementing Lean Software Development: From Concept to Cash
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285
Illustrated Microsoft Office 365 & Excel 2016: Intermediate
Photos for Mac and iOS: The Missing Manual
Learning SAS by Example: A Programmer's Guide, Second Edition: A Programmer's Guide, Second Edition
Cracking the IT Architect Interview
Quicken for Windows: The Official Guide, Eighth Edition (Quicken Guide)
Access in easy steps: Illustrated using Access 2019
Refactoring: Improving the Design of Existing Code
Excel Dashboards and Reports For Dummies
How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR
Open Government: Collaboration, Transparency, And Participation In Practice
Innovation Games: Creating Breakthrough Products Through Collaborative Play
Becoming an Ethical Hacker: Masters at Work
Hacking Product Design: A Guide to Designing Products for Startups
What Happens in Vegas Stays on YouTube: Privacy Is Dead. The New Rules of Reputation.
CAPM/PMP Project Management Certification All-In-One Exam Guide, Fourth Edition
Penetration Testing with Raspberry Pi - Second Edition
Splunk Operational Intelligence Cookbook: Over 80 recipes for transforming your data into business-critical insights using Splunk, 3rd Edition
Linux (Hacking Exposed)
Hacking With Kali Linux: The Practical Ethical Hackers Guide To Learn How To Protect Yourself From Cyber Attacks. Cybersecurity And Penetration Testing Tips Included (Computer Programming, Coding)
R Cookbook: Proven Recipes for Data Analysis, Statistics, and Graphics
Data Governance: How to Design, Deploy, and Sustain an Effective Data Governance Program
HOW TO BECOME FAMOUS ON TIK TOK: A Complete Guide On How To Get More Likes And Views On Your Tiktok Videos, Increase Large Fan Base, Making Money And Becoming Famous On Tik Tok
Virtual Unreality: The New Era of Digital Deception
C++ Pocket Reference
M Is for (Data) Monkey: A Guide to the M Language in Excel Power Query
Password Log: An Internet Address and Password Journal (Circles)
MOS 2016 Study Guide for Microsoft Excel Expert (MOS Study Guide)
CompTIA Security+ All-in-One Exam Guide, Second Edition (Exam SY0-201)
Honeypots: Tracking Hackers
Product-Led Growth: How to Build a Product That Sells Itself
Agile Data Science 2.0: Building Full-Stack Data Analytics Applications with Spark
R For Dummies, 2nd Edition
Learn Adobe Illustrator CC for Graphic Design and Illustration: Adobe Certified Associate Exam Preparation (2nd Edition) (Adobe Certified Associate (ACA))
New Perspectives Microsoft Office 365 & Access 2016: Comprehensive
Excel 2019 Bible
Copywriting Secrets: How Everyone Can Use The Power Of Words To Get More Clicks, Sales and Profits . . . No Matter What You Sell Or Who You Sell It To!
Compilers: Principles, Techniques, and Tools
CompTIA Security+ Study Guide: SY0-401
The Adobe Photoshop CC Book for Digital Photographers (2017 release) (Voices That Matter)
Microsoft Office 2019 Step by Step
Deep Learning for NLP and Speech Recognition
Hands-On Financial Modeling with Microsoft Excel 2019: Build practical models for forecasting, valuation, trading, and growth analysis using Excel 2019
Building Ethereum DApps: Decentralized Applications on the Ethereum Blockchain
Agile Project Management with Scrum (Developer Best Practices)
Ethical Hacking: Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking
Terror on the Internet: The New Arena, the New Challenges
Learning ServiceNow: Administration and development on the Now platform, for powerful IT automation, 2nd Edition
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Building Microservices: Designing Fine-Grained Systems
Learning Tableau 2019: Tools for Business Intelligence, data prep, and visual analytics, 3rd Edition
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware
Cracking the Full Stack Developer Interview: The Complete Handbook to Land the Job
Password Book: Internet Password Book with Alphabetical Tabs, Password Keeper Large Print, Small Password Book, Organizer Logbook 6 x 9
Expert C Programming: Deep C Secrets
Shelly Cashman Series Microsoft Office 365 & Excel 2016: Comprehensive
Honeypots for Windows (The Experts Voice)
Numerical Python: Scientific Computing and Data Science Applications with Numpy, SciPy and Matplotlib
Murach's SQL Server 2016 for Developers
Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers
Windows Forensics
Hiding from the Internet: Eliminating Personal Online Information
iOS Application Security: The Definitive Guide for Hackers and Developers
MikroTik Security Guide
PowerShell in Depth
Accelerated C++: Practical Programming by Example
Sh!t I Can't Remember: Organizer/Log Book/Notebook for Passwords and Shit/Password Book/Gift for Friends/Coworkers/Seniors/Mom/Dad/Weeding Planners
2020-2021 Monthly Planner: Blue Floral 2 Year Monthly Planner Calendar Schedule Organizer January 2020 to December 2021 (24 Months) With Holidays and inspirational Quotes
CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205, 2nd Edition
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
ACCOUNTING INFORMATION SYSTEMS
QuickBooks 2019 All-in-One For Dummies (For Dummies (Business & Personal Finance))
Internet Password Logbook: A Password Journal, Log Book & Notebook for Organization 0083 Black Marble
Cyber Reconnaissance, Surveillance and Defense
Applied Statistics for Business and Management using Microsoft Excel
Password Log Book: Internet Password Address Book, Password Lock Journal, Password Book, Password-Internet Book, Hydrangea Flower Cover (Volume 42)
Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
Network+ Guide to Networks
slide:ology: The Art and Science of Creating Great Presentations
Learning Linux Binary Analysis
Wicket in Action
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Insanely Great: The Life and Times of Macintosh, the Computer that changed Everything
Generalized Linear Models With Examples in R (Springer Texts in Statistics)
Sit Back and Relax: 4x6 Small Notebook for Password with Alphabetical Tabs | Floral Design Teal
JavaScript: The Definitive Guide
Cybersecurity For Beginners: Discover the Trade’s Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism
Conquest in Cyberspace: National Security and Information Warfare
Hacking Exposed Mobile: Security Secrets & Solutions
SuperVision: An Introduction to the Surveillance Society
Microsoft Cloud Security for the C-level: Protect, Detect & Respond with Azure Cloud Security
Learn Excel 2019 Expert Skills with The Smart Method: Tutorial teaching Advanced Skills including Power Pivot
Random Number Generators—Principles and Practices: A Guide for Engineers and Programmers
Accumulo: Application Development, Table Design, and Best Practices
Google Hacks: Tips & Tools for Finding and Using the World's Information
The Darkening Web: The War for Cyberspace
Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
C Programming Language, 2nd Edition
How Do I Do That In InDesign?
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Your Online Privacy Scorecard Health Information Websites: How your "health interests" are collected, used and sold! ...and what you can do about it.
CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)
Beyond Bullet Points: Using PowerPoint to tell a compelling story that gets results (4th Edition)
The Little Schemer - 4th Edition
CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development (3rd Edition)
Using the Internet Safely For Seniors For Dummies
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses (Expert's Voice in Open Source)
Secure Programming Cookbook for C and C++: Recipes For Cryptography, Authentication, Input Validation & More
Password notebook: Medium-size internet address and password logbook / journal / diary - Blue-eyed kitten cover (Cat lover's notebooks)
Excel 2013 All-in-One For Dummies
Microsoft Project 2019 For Dummies (Project for Dummies)
Gray Hat Hacking the Ethical Hackers Handbook
Teach Yourself VISUALLY Windows 10 Anniversary Update
Microsoft SharePoint 2013 Plain & Simple
Data Architecture: A Primer for the Data Scientist: A Primer for the Data Scientist
Unix Network Programming, Volume 1: The Sockets Networking API (3rd Edition)
Elliptic Curves in Cryptography (London Mathematical Society Lecture Note Series)
Geopolitics of Cybersecurity: Implications for the Future of Humanity
Computing: A Hacker's Dictionary
Adobe Photoshop CS6 Classroom in a Book
Excel VBA Programming For Dummies (For Dummies (Computer/Tech))
Burp Suite Essentials
Routledge Handbook of Surveillance Studies (Routledge International Handbooks)
Elliptic Curves: Number Theory and Cryptography (Discrete Mathematics and Its Applications)
Cybercrime and Society
Security Risk Management Aide-Mémoire
Cloud Native Transformation: Practical Patterns for Innovation
Cisco ISE for BYOD and Secure Unified Access
Marketing Analytics: Data-Driven Techniques with Microsoft Excel
Pseudorandomness and Cryptographic Applications (Princeton Computer Science Notes)
Regression Modeling Strategies: With Applications to Linear Models, Logistic and Ordinal Regression, and Survival Analysis (Springer Series in Statistics)
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Graphic Design For Everyone: Understand the Building Blocks so You can Do It Yourself
50 Useful Excel Functions (Excel Essentials)
Crimeware: Understanding New Attacks and Defenses: Understanding New Attacks and Defenses
Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom
Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)
The Pragmatic Programmer: From Journeyman to Master
The Artist in the Machine: The World of AI-Powered Creativity (The MIT Press)
Total Workday Control Using Microsoft Outlook
Practical Mobile Forensics,: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms, 3rd Edition
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
WordPress Explained: Your Step-by-Step Guide to WordPress (2019 Edition)
Kali Linux 2: Windows Penetration Testing
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
MOS 2016 Study Guide for Microsoft Outlook (MOS Study Guide)
Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation's Most Secure Computer Systems
Excel 2013 Power Programming with VBA
Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
Cyberbulling and the Wild, Wild Web
Scrum For Dummies (For Dummies (Computers))
Nightwork: A History of Hacks and Pranks at MIT (The MIT Press)
Windows Server 2016 Security, Certificates, and Remote Access Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016
The Frugal CISO
The Cyber Threat: Know the threat to beat the threat
Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Fourth Edition (Exam N10-006) (Mike Meyers' Computer Skills)