Securing Office 365
Matthew Katzer
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Embedded Systems Architecture
Daniele Lacamera
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)