Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Learning Malware Analysis
MONNAPPA K A
Practical Cyber Forensics
Niranjan Reddy
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)