The 80/20 Principle: The Secret to Achieving More With Less
Richard Koch
Encyclopedia of Curriculum Studies
Craig Kridel
The Nomos of the Earth in the International Law of the Jus Publicum ...
Carl Schmitt
The Seas of Language
Michael Dummett
Combating Cult Mind Control: The #1 Best-Selling Guide to Protection, ...
Steven Hassan
Penetration Testing for Dummies
Robert Shimonski
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Kali Linux Penetration Testing Bible
Gus Khawaja
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Grokking Web Application Security
Malcolm McDonald
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Network Troubleshooting Tools
Joseph Sloan
Getting Started With OAuth 2.0
Ryan Boyd
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann