Beginning Ethical Hacking with Kali Linux_ Computational Techniques ...
Unknown
Cognitive Underwater Acoustic Networking Techniques
Dimitri Sotnik & Michael Goetz & Ivor Nissen
Risk Profile Contingent Analysis of Management Control Systems
Peter Göstl
The Digital Darkroom
James Abbott
Human Resource Management
B.B. Mahapatro