A University Grammar of English
Randolph Quirk & Sidney Greenbaum
A Textbook of Data Structures and Algorithms, Volume 1
G. A. Vijayalakshmi Pai
Foundations of Financial Risk
GARP (Global Association of Risk Professionals) & Richard Apostolik & Christopher Donohue
Cyber Security
Wei Lu & Qiaoyan Wen & Yuqing Zhang & Bo Lang & Weiping Wen & Hanbing Yan & Chao Li & Li Ding & Ruiguang Li & Yu Zhou
Microsoft Word - Cyber security ACT manual draft V3 .docx
Unknown
Advances in Cyber Security
Nibras Abdullah & Selvakumar Manickam & Mohammed Anbar
Beginning Ethical Hacking with Kali Linux
Sanjib Sinha
Big Data Security
Shibakali Gupta & Indradip Banerjee & Siddhartha Bhattacharyya
biometric 2024
CIT 410
Data Privacy and Trust in Cloud Computing
Theo Lynn & John G. Mooney & Lisa van der Werff & Grace Fox
Cloud Computing Security
Dinesh G. Harkut
Combatting Cybercrime and Cyberterrorism
Babak Akhgar & Ben Brewster
Computer Forensics
Marie-Helen Maras
Developing Graphics Frameworks with Python and OpenGL
Lee Stemkoski Michael Pascale
A9R7yhw2k_1jkxti_[..]
MDPI
Cybersecurity Threats with New Perspectives
Muhammad Sarfraz
Cyber Security Politics
Myriam Dunn Cavelty & Andreas Wenger
Cyber Peace
Scott J. Shackelford & Frederick Douzet & Christopher Ankersen
Cyber Security and Critical Infrastructures
Leandros Maglaras & Helge Janicke & Mohamed Amine Ferrag
Cyber_Security_of[..] 2022
Cybersecurity Issues in Smart Grids and Future Power Systems
Arshad Arshad
Cyberspace and Cybersecurity
George Kostopoulos
Cyberspace, Cybersecurity, and Cybercrime
Janine Kremling & Amanda M. Sharp Parker
Data_Hiding_and_I[..] 2022
Digital Forensics Basics
Nihad A. Hassan
Essentials of computing systems
João M. Fernandes
Everyday Cybersecurity: A practical approach to understanding ...
Christopher Cox
Guide to Computer Forensics and Investigations
Bill Nelson & Amelia Phillips & Christopher Steuart
Guide to Vulnerability Analysis for Computer Networks and Systems
Simon Parkinson & Andrew Crampton & Richard Hill
Hacking : The Ultimate Hacking for Beginners : How to Hack : ...
Hacklog Volume 1 Anonymity (English Version): It Security & ...
Stefano Novelli
HACK-X-CRYPT
UJJWAL SAHAY
Handbook of Big Data and IoT Security
Ali Dehghantanha & Kim-Kwang Raymond Choo
Industrial Wireless Sensor Networks
Seong-eun Yoo & Taehong Kim
Information Hiding: Steganography and Watermarking-Attacks and ...
Neil F. Johnson & Zoran Duric & Sushil Jajodia
Internet-of-Things (IoT) Systems
Dimitrios Serpanos & Marilyn Wolf
Introduction to Mobile Network Engineering: GSM, 3G-WCDMA, LTE ...
Alexander Kukushkin
Introduction to Cyber Security
Introductory Computer Forensics_ A Hands-on Practical Approach ...
Essentials of computing systems - 2ª edição
Introductory Computer Forensics
Xiaodong Lin
Malware
Eduard Babulak
Modelling, Dimensioning and Optimization of 5G Communication ...
Ioannis D. Moscholios & Mariusz Głąbowski & Panagiotis Sarigiannidis
Practical Programming
Paul Gries & Jennifer Campbell & Jason Montojo
Security and Privacy in Networks and Multimedia 2024
Security and Privacy in Cyber-Physical Systems
Houbing Song & Glenn A. Fink & Sabina Jeschke
Hacking
Christopher Lombardi
Steganography Techniques for Digital Images
Abid Yahya
The Dark Web: Breakthroughs in Research and Practice
Management Association, Information Resources
The NICE Cyber Security Framework
Izzat Alsmadi
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY
Lance Henderson
Tribe of Hackers_ Cybersecurity Advice from the Best Hackers ...
Weaving the Dark Web
Robert W. Gehl
Understanding Accountability in Democratic Governance
Yannis Papadopoulos
Quality Management and Accounting in Service Industries
Wojciech Sadkowski & Piotr Jedynak
Advanced Financial Risk Management
Donald R. Van Deventer & Kenji Imai & Mark Mesler
Banking and Accounting Issues
Nizar Mohammad Alsharari
Corporate Finance
Pierre Vernimmen & Pascal Quiry & Yann Le Fur & Maurizio Dallocchio & Antonio Salvi
Strategic Corporate Finance
Justin Pettit
Financial Investigation and Forensic Accounting
George A. Manning