
Pen Testing from Contract to Report
Pen Testing from Contract to Report Author:by Alfred Basta (Author), Nadine Basta (Author), Waqar Anwar (Author) Publish...

Pen Testing from Contract to Report Author:by Alfred Basta (Author), Nadine Basta (Author), Waqar Anwar (Author) Publish...

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto Author:by Roger A. Grimes (A...

Fundamentals of Database Management Systems Author:by Mark L. Gillenson (Author) Publisher:Wiley Edition:3rd edition P...

Handbook of Software Fault Localization: Foundations and Advances Author:by W. Eric Wong (Editor), T.H. Tse (Editor) Pub...

From 5G to 6G: Technologies, Architecture, AI, and Security Author:by Abdulrahman Yarali (Author) Publisher:Wiley-IEEE ...

Security and Privacy for 6G Massive IoT Author:by Georgios Mantas (Editor), Firooz Saghezchi (Editor), Jonathan Rodrigue...

Project Management ToolBox: Tools and Techniques for the Practicing Project Manager Author:by Cynthia Snyder Dionisio (A...

Decentralizing Finance: How DeFi, Digital Assets, and Distributed Ledger Technology Are Transforming Finance Author:by K...

Cyber Guardians: Empowering Board Members for Effective Cybersecurity Author:by Bart R. McDonough (Author) Publisher:Wi...

Data Visualization in R and Python Author:by Marco Cremonini (Author) Publisher:Wiley Edition:1st edition Publication ...