Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Hands-on Approach to Modern Quantum Algorithms
Unknown
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Structures Succinctly Part 2
Data Structures Succinctly (2)