Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Embedded Systems Architecture
Daniele Lacamera
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
GIS Succinctly
Peter Shaw