Computer Science from teh bottom up
Unknown
Software Supply Chain Security
Cassie Crossley
Java Memory Management
Maaike van Putten & Sean Kennedy
Threat Modeling
Izar Tarandach and Matthew J. Coles
GIS Succinctly
Peter Shaw