War on Ivermectin: the Medicine that Saved Millions and Could ...
Pierre Kory
Identität: Wie der Verlust der Würde unsere Demokratie gefährdet
Francis Fukuyama
Das Transformative Potenzial Von Konsum Zwischen Nachhaltigkeit ...
Renate Hübner & Barbara Schmon
Kritische Verbraucherforschung (1)
Death of a Guru: A Remarkable True Story of One Man's Search ...
Dave Hunt & Rabi R. Maharaj
Some Ethnolinguistic Notes on Polar Eskimo
Stephen Pax Leonard
Contemporary Studies in Descriptive Linguistics (1)
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Cybersecurity for Dummies
Joseph Steinberg
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Worried About the Wrong Things: Youth, Risk, and Opportunity ...
Jacqueline Ryan Vickery
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Getting Started With OAuth 2.0
Ryan Boyd
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Managing the Internet of Things: Architectures, Theories and ...
Jun Huang & Kun Hua
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Spatial Computing
Shashi Shekhar & Pamela Vold
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias