Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Transitioning to Java
Ken Fogel
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Knockout.js Succinctly
Unknown