Privileged Attack Vectors
Morey J. Haber
Practical Monitoring
Mike Julian
Data Science at the Command Line
Jeroen Janssens
Industrial Cybersecurity
Pascal Ackerman
Knockout.js Succinctly
Unknown