Evolutionary Parasitology
Paul Schmid-Hempel
Advanced Practice Nursing
Joan Marlene Stanley
Unknown_Physical_[..]
Unknown
epdf.tips_gale-en[..]
Foundations of Financial Risk
GARP (Global Association of Risk Professionals) & Richard Apostolik & Christopher Donohue
Forensic Accounting and Fraud Investigation for Non-Experts
Howard Silverstone & Michael Sheetz & Stephen Pedneault & Frank Rudewicz
Howard Silverstone & Michael Sheetz & STEPHEN PEDNEAULT and FRANK RUDEWICZ
Fintech
Parag Y. Arjunwadkar
Fintech in a Flash
Agustin Rubini
Financial Risk Management
Jimmy Skoglund & Wei Chen
Financial Investigation and Forensic Accounting
George A. Manning
Strategic Corporate Finance
Justin Pettit
Corporate Finance
Pierre Vernimmen & Pascal Quiry & Yann Le Fur & Maurizio Dallocchio & Antonio Salvi
Banking and Accounting Issues
Nizar Mohammad Alsharari
Advanced Financial Risk Management
Donald R. Van Deventer & Kenji Imai & Mark Mesler
Quality Management and Accounting in Service Industries
Wojciech Sadkowski & Piotr Jedynak
Understanding Accountability in Democratic Governance
Yannis Papadopoulos
Weaving the Dark Web
Robert W. Gehl
Tribe of Hackers_ Cybersecurity Advice from the Best Hackers ...
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY
Lance Henderson
The NICE Cyber Security Framework
Izzat Alsmadi
The Dark Web: Breakthroughs in Research and Practice
Management Association, Information Resources
Steganography Techniques for Digital Images
Abid Yahya
Hacking
Christopher Lombardi
Security and Privacy in Cyber-Physical Systems
Houbing Song & Glenn A. Fink & Sabina Jeschke
Security and Privacy in Networks and Multimedia 2024
Practical Programming
Paul Gries & Jennifer Campbell & Jason Montojo
Modelling, Dimensioning and Optimization of 5G Communication ...
Ioannis D. Moscholios & Mariusz Głąbowski & Panagiotis Sarigiannidis
Malware
Eduard Babulak
Introductory Computer Forensics
Xiaodong Lin
Essentials of computing systems - 2ª edição
João M. Fernandes
Introductory Computer Forensics_ A Hands-on Practical Approach ...
Introduction to Cyber Security
Introduction to Mobile Network Engineering: GSM, 3G-WCDMA, LTE ...
Alexander Kukushkin
Internet-of-Things (IoT) Systems
Dimitrios Serpanos & Marilyn Wolf
Information Hiding: Steganography and Watermarking-Attacks and ...
Neil F. Johnson & Zoran Duric & Sushil Jajodia
Industrial Wireless Sensor Networks
Seong-eun Yoo & Taehong Kim
Handbook of Big Data and IoT Security
Ali Dehghantanha & Kim-Kwang Raymond Choo
HACK-X-CRYPT
UJJWAL SAHAY
Hacklog Volume 1 Anonymity (English Version): It Security & ...
Stefano Novelli
Hacking : The Ultimate Hacking for Beginners : How to Hack : ...
Guide to Vulnerability Analysis for Computer Networks and Systems
Simon Parkinson & Andrew Crampton & Richard Hill
Guide to Computer Forensics and Investigations
Bill Nelson & Amelia Phillips & Christopher Steuart
Everyday Cybersecurity: A practical approach to understanding ...
Christopher Cox
Essentials of computing systems
Digital Forensics Basics
Nihad A. Hassan
Data_Hiding_and_I[..] 2022
MDPI
Data Privacy and Trust in Cloud Computing
Theo Lynn & John G. Mooney & Lisa van der Werff & Grace Fox
Cyberspace, Cybersecurity, and Cybercrime
Janine Kremling & Amanda M. Sharp Parker
Cyberspace and Cybersecurity
George Kostopoulos
Cybersecurity Issues in Smart Grids and Future Power Systems
Arshad Arshad
Cyber_Security_of[..] 2022
Cyber Security and Critical Infrastructures
Leandros Maglaras & Helge Janicke & Mohamed Amine Ferrag
Cyber Peace
Scott J. Shackelford & Frederick Douzet & Christopher Ankersen
Cyber Security Politics
Myriam Dunn Cavelty & Andreas Wenger
Cybersecurity Threats with New Perspectives
Muhammad Sarfraz
A9R7yhw2k_1jkxti_[..]
Developing Graphics Frameworks with Python and OpenGL
Lee Stemkoski Michael Pascale
Computer Forensics
Marie-Helen Maras
Combatting Cybercrime and Cyberterrorism
Babak Akhgar & Ben Brewster
Cloud Computing Security
Dinesh G. Harkut