
The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership
The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership (Security, Audit and Leadership Series) Author:Walt Po...

The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership (Security, Audit and Leadership Series) Author:Walt Po...

Kickstart Java Programming Fundamentals: Build, Optimize and Scale Real-World Applied Java Projects Using AI and Modern ...

Mastering Deepfake Technology: Strategies for Ethical Management and Security (River Publishers Series in Digital Securi...

AI for Nonprofits: Putting Artificial Intelligence to Work for Your Cause Author:Darian Rodriguez Heyman (Author), Chery...

Advanced Applications in Heat Exchanger Technologies Author:Sunil Kumar (Author), Kavita Rathore (Author), Debjyoti Bane...

Reengineering Cyber Security Process: Quality Management (De Gruyter Series on the Applications of Mathematics in Engine...

Apps and Services with .NET 8: Build practical projects with Blazor, .NET MAUI, gRPC, GraphQL, and other enterprise tech...
CEH Certified Ethical Hacker Cert Guide, 5th Edition Author:Omar Santos(Author),Michael Gregg (Author) Publisher finelyb...

Progressive Computational Intelligence, Information Technology and Networking Author:Poonam Nandal (Author), Mamta Dahiy...

CompTIA A+ Complete Review Guide: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide) Author:Troy McMillan...