Network Attacks and Exploitation
Matthew Monte
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Building an Event-Driven Data Mesh
Adam Bellemare
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)