Moral Psychology
Valerie Tiberius
Accounting and Finance for Non-specialists
Peter Atrill & E. J. McLaney
Clinical Case Studies in Physiotherapy E-Book
Lauren Jean Guthrie
Laboratory Medicine Diagnosis of Disease in Clinical Laboratory ...
Michael Laposata
Malware
Eduard Babulak
Introductory Computer Forensics
Xiaodong Lin
Essentials of computing systems - 2ª edição
João M. Fernandes
Introductory Computer Forensics_ A Hands-on Practical Approach ...
Unknown
Introduction to Cyber Security
Introduction to Mobile Network Engineering: GSM, 3G-WCDMA, LTE ...
Alexander Kukushkin
Internet-of-Things (IoT) Systems
Dimitrios Serpanos & Marilyn Wolf
Information Hiding: Steganography and Watermarking-Attacks and ...
Neil F. Johnson & Zoran Duric & Sushil Jajodia
Industrial Wireless Sensor Networks
Seong-eun Yoo & Taehong Kim
Handbook of Big Data and IoT Security
Ali Dehghantanha & Kim-Kwang Raymond Choo
HACK-X-CRYPT
UJJWAL SAHAY
Hacklog Volume 1 Anonymity (English Version): It Security & ...
Stefano Novelli
Hacking : The Ultimate Hacking for Beginners : How to Hack : ...
Guide to Vulnerability Analysis for Computer Networks and Systems
Simon Parkinson & Andrew Crampton & Richard Hill
Guide to Computer Forensics and Investigations
Bill Nelson & Amelia Phillips & Christopher Steuart
Everyday Cybersecurity: A practical approach to understanding ...
Christopher Cox
Essentials of computing systems
Digital Forensics Basics
Nihad A. Hassan
Data_Hiding_and_I[..] 2022
MDPI
Data Privacy and Trust in Cloud Computing
Theo Lynn & John G. Mooney & Lisa van der Werff & Grace Fox
Cyberspace, Cybersecurity, and Cybercrime
Janine Kremling & Amanda M. Sharp Parker
Cyberspace and Cybersecurity
George Kostopoulos
Cybersecurity Issues in Smart Grids and Future Power Systems
Arshad Arshad
Cyber_Security_of[..] 2022
Cyber Security and Critical Infrastructures
Leandros Maglaras & Helge Janicke & Mohamed Amine Ferrag
Cyber Peace
Scott J. Shackelford & Frederick Douzet & Christopher Ankersen
Cyber Security Politics
Myriam Dunn Cavelty & Andreas Wenger
Cybersecurity Threats with New Perspectives
Muhammad Sarfraz
A9R7yhw2k_1jkxti_[..]
Developing Graphics Frameworks with Python and OpenGL
Lee Stemkoski Michael Pascale
Computer Forensics
Marie-Helen Maras
Combatting Cybercrime and Cyberterrorism
Babak Akhgar & Ben Brewster
Cloud Computing Security
Dinesh G. Harkut
CIT 410
biometric 2024
Big Data Security
Shibakali Gupta & Indradip Banerjee & Siddhartha Bhattacharyya
Beginning Ethical Hacking with Kali Linux
Sanjib Sinha
Advances in Cyber Security
Nibras Abdullah & Selvakumar Manickam & Mohammed Anbar
Microsoft Word - Cyber security ACT manual draft V3 .docx
Cyber Security
Wei Lu & Qiaoyan Wen & Yuqing Zhang & Bo Lang & Weiping Wen & Hanbing Yan & Chao Li & Li Ding & Ruiguang Li & Yu Zhou
Building the Infrastructure for Cloud Security
Raghuram Yeluri & Enrique Castro-Leon
Linux Essentials for Cybersecurity
William Rothwell & Denise Kinsey
5G LTE Narrowband Internet of Things (NB-IoT)
Hossam Fattah
Mass Media and Society
James Curran & Michael Gurevitch
Aesthetics of Film Production
James B. Joyce
Applied Mass Communication Theory
Jack Rosenberry & Lauren A. Vicker
The Photographer's Career Guide to Shooting Production Stills ...
Jace Downs
Introduction to Sociology 3e
Tonja R. Conerly & Kathleen Holmes & Asha Lal Tamang
History of Nigerian Mass Media
Olugbenga J. Kalejaiye & Omolade A. Atofojomo & Ayodele T. Odunlami
Audio Post Production for Television and Film
Hilary Wyatt & Tim Amyes
The Media Handbook
Helen Katz
Political Leadership in Disaster and Crisis Communication and ...
Hamish McLean & Jacqui Ewart
Graphics in Design & Communication
David Anderson
American Journalism and International Relations
Giovanna Dell'Orto
Embodiment, Relation, Community
Garnet C. Butchart
Mass Communication, Culture and Society in West Africa
Frank Okwu Ugboajah
Broadcast News Writing, Reporting, and Producing
Frank Barnas
Broadcast News in the Digital Age
Faith Sidlow & Kim Stephens