THE BEST E-BOOK

csruyuradewre

PhoneGap Essentials: Building Cross-Platform Mobile Apps
Build Native Cross-Platform Apps with Appcelerator: A beginner's guide for web developers
Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists
You Are Not a Gadget: A Manifesto
AWS Certified Cloud Practitioner Training Notes 2019: Fast-track your exam success with the ultimate cheat sheet for the CLF-C01 exam
CISM Certified Information Security Manager All-in-One Exam Guide
Coding the Matrix: Linear Algebra through Applications to Computer Science
The Adobe Photoshop Lightroom Classic CC Book for Digital Photographers (Voices That Matter)
Mastering Embedded Linux Programming: Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates, 2nd Edition
Network and System Security
Microsoft Office 365 Administration Inside Out (Includes Current Book Service) (2nd Edition)
Practical Antenna Handbook 5/e
Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine
SQL: 2 Books in 1: Beginner's Guide & 7-Day Crash Course, How to Quickly Learn Structured Query Language Programming, Server Administration, Computer and Database Management Step-by-Step
Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
Token Economy: How Blockchains and Smart Contracts Revolutionize the Economy
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200), First Edition
Sound Reproduction: The Acoustics and Psychoacoustics of Loudspeakers and Rooms (Audio Engineering Society Presents)
How Linux Works, 2nd Edition: What Every Superuser Should Know
Learn PowerShell Scripting in a Month of Lunches
Modern Antennas
Understanding ArubaOS: Version 8.x
Network Warrior
The Site Reliability Workbook: Practical Ways to Implement SRE
My iPad (covers iOS 5.1 on iPad, iPad 2, and iPad 3rd gen) (4th Edition)
An Empire of Their Own: How the Jews Invented Hollywood
Intro to Bluetooth Low Energy: The easiest way to learn BLE
Linux for Beginners: An Introduction to the Linux Operating System and Command Line
I Forgot to Remember: 4x6 Small Internet Password Logbook Organizer with Tabs | Flower Pink Design
Principles of Computer Security Lab Manual, Fourth Edition
Fundamentals of Radar Signal Processing, Second Edition (McGraw-Hill Professional Engineering)
The Essential Guide to Telecommunications (6th Edition) (Essential Guide Series)
CCNA Routing and Switching Portable Command Guide (ICND1 100-105, ICND2 200-105, and CCNA 200-125)
Computer & Internet Security: A Hands-on Approach
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8e & CISSP Official (ISC)2 Practice Tests, 2e
The Linux Command Line, 2nd Edition: A Complete Introduction
The Digital Divide: Facing a Crisis or Creating a Myth? (MIT Press Sourcebooks)
Hacking Exposed 7: Network Security Secrets and Solutions
CCNA Routing and Switching Complete Study Guide: Exam 100-105, Exam 200-105, Exam 200-125
Windows Server 2019 & Essentials 2019 Installation Guide for Small Businesses
Engineering Software as a Service: An Agile Approach Using Cloud Computing + $10 AWS Credit
ISO 27001 Handbook: Implementing and auditing an Information Security Management System in small and medium-sized businesses
Mastering Adobe Captivate 7
iPad For Seniors For Dummies
LPIC-1 Certification Kit: Exam 101-500 and Exam 102-500
AWS Certified Solutions Architect Associate All-in-One Exam Guide (Exam SAA-C01)
SharePoint Online from Scratch: Office 365 SharePoint from basics to advanced
The Internet For Dummies
Multirate Systems And Filter Banks
iPhone SDK Development (The Pragmatic Programmers)
Computer Networking: A Top-Down Approach, 6Th Edn
Exam Ref AZ-900 Microsoft Azure Fundamentals
The Walt Disney Studios: A Lot to Remember (Disney Editions Deluxe)
Network Science
Learn Windows PowerShell in a Month of Lunches
The Age of Earthquakes: A Guide to the Extreme Present
Real World Print Production with Adobe Creative Cloud (Graphic Design & Visual Communication Courses)
Microsoft Visual Basic 2008: Comprehensive Concepts and Techniques (Available Titles Skills Assessment Manager (SAM) - Office 2010)
Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks
Exchange Server 2016: The Administrator's Reference
Twitter For Dummies (For Dummies Series)
Learning Spark: Lightning-Fast Big Data Analysis
Blockchain Basics: A Non-Technical Introduction in 25 Steps
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6
Millimeter Wave Wireless Communications
Big Data: Principles and best practices of scalable realtime data systems
Building Android Games with Cocos2d-x
TCP/IP Illustrated, Vol. 1: The Protocols (Addison-Wesley Professional Computing Series)
Virtualization for Dummies
Troubleshooting with Wireshark: Locate the Source of Performance Problems
iOS and OS X Network Programming Cookbook
Routing TCP/IP, Volume 1 (2nd Edition)
SharePoint 2016 User's Guide: Learning Microsoft's Business Collaboration Platform
Alcatel-Lucent Scalable IP Networks Self-Study Guide: Preparing for the Network Routing Specialist I (NRS 1) Certification Exam
Elementary Information Security
Essentials of Software Engineering
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
Information Architecture: For the Web and Beyond
Systems Performance: Enterprise and the Cloud
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam
People I Want to Punch in the Face: Best Gag Gift, Notebook, Journal, Diary, Doodle Book (110 Pages, Blank, 6 x 9) (Awesome Notebooks)
Unassailable: Protect Yourself from Deplatform Attacks, Cancel Culture & other Online Disasters
Site Reliability Engineering: How Google Runs Production Systems
Angular Development with Typescript
iPad For Dummies
Mastering Swift 3
Cloud Native: Using Containers, Functions, and Data to Build Next-Generation Applications
101 Items To Sell On Ebay (Seventh Edition - Updated for 2020): How to Make Money Selling Garage Sale & Thrift Store Finds
The iPad and iPad mini Pocket Guide (Peachpit Pocket Guide)
CTS Certified Technology Specialist Exam Guide, Second Edition
CEH Certified Ethical Hacker Bundle, Fourth Edition
Foundation iPhone App Development: Build An iPhone App in 5 Days with iOS 6 SDK
Metasploit: The Penetration Tester's Guide
The Adobe Photoshop CC Book for Digital Photographers (2017 release) (Voices That Matter)
Learn Windows PowerShell in a Month of Lunches
Hands-On Ethical Hacking and Network Defense
The iPad 2 Pocket Guide (Peachpit Pocket Guide)
CISSP Guide to Security Essentials
Adaptive Code: Agile coding with design patterns and SOLID principles (Developer Best Practices)
My iPad 2 (covers iOS 4.3) (2nd Edition)
PreAlgebra DeMystiFieD, Second Edition
Machine Learning For Absolute Beginners: Applications of Artificial Intelligence From a World-Class Practitioner
CompTIA Network+ Review Guide: Exam N10-007
Where Wizards Stay Up Late: The Origins of the Internet
Intrusion Detection Networks: A Key to Collaborative Security
Cloud Native DevOps with Kubernetes: Building, Deploying, and Scaling Modern Applications in the Cloud
Intelligence-Driven Incident Response: Outwitting the Adversary
Adopt & Embrace Microsoft Teams: A manager's guide to communication, collaboration and coordination with Microsoft Teams
Essentials of Database Management
BE LEFT BEHIND: Discover Bitcoin and Cryptocurrency Before Your Grandma Beats You to It
Learning Swift 2 Programming: Learni Swift 2 Prog ePub _2
Cloud Native Transformation: Practical Patterns for Innovation
Http: The Definitive Guide (Definitive Guides)
EMC for Product Designers
Applied Network Security Monitoring: Collection, Detection, and Analysis
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001)
CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)
McSe: Exchange Server 5.5 Study Guide
Aarp Tablets: Tech To Connect
iPad: The Missing Manual
Introduction to Networking: How the Internet Works
Network Information Theory
Photoshop CC: Visual QuickStart Guide (2015 release)
Exam Ref 70-741 Networking with Windows Server 2016
Surveillance Valley: The Secret Military History of the Internet
Microinteractions: Full Color Edition: Designing with Details
Cloud FinOps: Collaborative, Real-Time Cloud Financial Management
Windows Command Line Administration Instant Reference
Black Hat Python: Python Programming for Hackers and Pentesters
CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition
Participatory Culture in a Networked Era: A Conversation on Youth, Learning, Commerce, and Politics
The Producer's Business Handbook: The Roadmap for the Balanced Film Producer (American Film Market Presents)
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Code Complete: A Practical Handbook of Software Construction, Second Edition
40 & Fabulous Birthday Guest Book: 40th - Fortieth Keepsake Memento Gift Book For Family Friends To Write In With Messages Good Wishes And Comments ... Gold Dripping Glitter Ombre Sign In Notebook
Scrum For Dummies (For Dummies (Computers))
Learn System Center Configuration Manager in a Month of Lunches
Head First JavaScript Programming: A Brain-Friendly Guide
A Practical Guide to Fedora and Red Hat Enterprise Linux (7th Edition)
Malicious Mobile Code: Virus Protection for Windows
Hands-On Azure for Developers: Implement rich Azure PaaS ecosystems using containers, serverless services, and storage solutions
Practical Cryptography
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
IT Disaster Recovery Planning FD
The Five Anchors of Cyber Resilience: Why some enterprises are hacked into bankruptcy, while others easily bounce back
Kubernetes in Action
Bash Pocket Reference: Help for Power Users and Sys Admins
Web Application Security, A Beginner's Guide
The Twenty-Six Words That Created the Internet
Kafka Streams in Action: Real-time apps and microservices with the Kafka Streams API
Who Owns the Future?
Restful Web Services Cookbook: Solutions For Improving Scalability And Simplicity
Hackers: Heroes of the Computer Revolution: 25th Anniversary Edition
Absolute Beginner's Guide to Ipod and Itunes
Cybersecurity Essentials
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Real-World SRE: The Survival Guide for Responding to a System Outage and Maximizing Uptime
From Gutenberg to Google: The History of Our Future
Designing Audio Power Amplifiers
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014
31 Days Before Your CCNA Routing & Switching Exam: A Day-By-Day Review Guide for the ICND1/CCENT (100-105), ICND2 (200-105), and CCNA (200-125) Certification Exams
Ham Radio Jargon and Q-Codes: A Quick Reference Guide
Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud
El enemigo conoce el sistema: Manipulación de ideas, personas e influencias después de la economía de la atención (Spanish Edition)
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Real-World Bug Hunting: A Field Guide to Web Hacking
VMware vSAN 6.7 U1 Deep Dive
101 Labs - CompTIA Network+: Hands-on Practical Labs for the CompTIA Network+ Exam (N10-007)
Extending Puppet - Second Edition
Mastering Windows Server 2019: The complete guide for IT professionals to install and manage Windows Server 2019 and deploy new capabilities, 2nd Edition
Active Directory Infrastructure Self-Study Training Kit: Stanek & Associates Training Solutions
The Internet of Money
Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition
Password Log Book: Email Password Organizer, Password Keeper Book, Passcode Diary, Password Storage Book, Hydrangea Flower Cover (Volume 38)
Mastering QuickBooks 2020: The ultimate guide to bookkeeping and QuickBooks Online
AWS: Amazon Web Services, the Ultimate Guide for Beginners to Advanced
Wireshark 101: Essential Skills for Network Analysis - Second Edition: Wireshark Solution Series
AWS Certified SysOps Administrator Associate All-in-One-Exam Guide (Exam SOA-C01)
Android Application Development Cookbook - Second Edition
Practical Network Security: An auditee's guide to zero findings.
Therapist's Guide to Clinical Intervention: The 1-2-3's of Treatment Planning (Practical Resources for the Mental Health Professional)
Wireless Networking: Introduction to Bluetooth and WiFi
The Rules for Online Dating: Capturing the Heart of Mr. Right in Cyberspace
DNS For Dummies
Evil by Design: Interaction Design to Lead Us into Temptation
Microsoft Windows Networking Essentials
A Practical Guide to Computer Forensics Investigations: A Prac Gui to Comp For Inv_p1 (Pearson IT Cybersecurity Curriculum (ITCC))
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
iPhone 5 Portable Genius
Lineman and Cablemans Field Manual, Second Edition
Letting Go of the Words: Writing Web Content that Works (Interactive Technologies)
(ISC)2 SSCP Study Guide and SSCP Practice Test Kit
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
The Practice of System and Network Administration: Volume 1: DevOps and other Best Practices for Enterprise IT (3rd Edition)
Digital Signal Processing (4th Edition)
Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Fifth Edition (Exam N10-007)
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
Shit I Forgot Again: Password Book With Tabs to Protect Your Usernames, Passwords and Other Internet Login Information | 6 x 9 inches (Quill Password Books)
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Learning ArcGIS Pro
UNIX and Linux System Administration Handbook (5th Edition)
OAuth 2 in Action
Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL
Building Wireless Sensor Networks: With Zigbee, Xbee, Arduino, And Processing
Prometheus: Up & Running: Infrastructure and Application Performance Monitoring
Node.js Design Patterns: Master best practices to build modular and scalable server-side web applications, 2nd Edition
Kubernetes: A Step-By-Step Guide For Beginners To Build, Manage, Develop, and Intelligently Deploy Applications By Using Kubernetes (2020 Edition)
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Password book: A Premium Journal And Logbook To Protect Usernames and Passwords: Login and Private Information Keeper, Vault Notebook and Online ... Calligraphy and Hand Lettering Design)
Beginning Power BI: A Practical Guide to Self-Service Data Analytics with Excel 2016 and Power BI Desktop
Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners (Computer Networking Series)
CTS Certified Technology Specialist Exam Guide, Third Edition
Explainable AI: Interpreting, Explaining and Visualizing Deep Learning (Lecture Notes in Computer Science)
Android Apps with Eclipse
MPLS in the SDN Era: Interoperable Scenarios to Make Networks Scale to New Services
The Rational Clinical Examination: Evidence-Based Clinical Diagnosis (Jama & Archives Journals)
Motorola XOOM For Dummies
Design of Ultra Wideband Antenna Matching Networks: Via Simplified Real Frequency Technique (Signals and Communication Technology)
The Cat: The Password Organizer Log That Looks Like a Regular Book (Hidden in Plain View) (Volume 4)
Expert Oracle Database 11g Administration (Expert's Voice in Oracle)
Advanced Genealogy Research Techniques
Electronics Technology Fundamentals: Conventional Flow Version (3rd Edition)
Beginning iOS Development with Swift: Create your own iOS apps today
Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems
C# 6 for Programmers (6th Edition) (Deitel Developer Series)
Windows Internals, Part 1 (Developer Reference)
Wisdom of the House of Night Oracle Cards: A 50-Card Deck and Guidebook
The Art of Screen Time: How Your Family Can Balance Digital Media and Real Life
Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Databases A Beginner's Guide
The Biz, 5th Edition (Expanded and Updated)
Hands-On Microservices with Kubernetes: Build, deploy, and manage scalable microservices on Kubernetes
Practice of Cloud System Administration, The: Designing and Operating Large Distributed Systems, Volume 2
Android Application Programming with OpenCV
SAP Cloud Platform Integration: The Comprehensive Guide (2nd Edition) (SAP PRESS)
Learn Windows PowerShell in a Month of Lunches
My Google Chromebook (4th Edition)
Professional Fiber Optic Installation, v.10: The Essentials For Success
The Way of the Web Tester: A Beginner's Guide to Automating Tests
Exploring Microsoft Office 2016 Volume 1 (Exploring for Office 2016 Series)
Budgeting Workbook: Daily Weekly Monthly Budget Planner 2020 Calendar Bill Payment Log Debt Organizer With Income Expenses and Savings Tracker
CCNA Routing and Switching 200-125 Official Cert Guide Library
Red Hat Enterprise Linux 8 Essentials: Learn to install, administer and deploy RHEL 8 systems
The Disney Book: A Celebration of the World of Disney
Create Rapid Web Application in Oracle Application Express 19: A platform to develop stunning, scalable data-centric web apps fast
FOA Reference Guide to Fiber Optics: Study Guide to FOA Certification
Routing TCP/IP, Volume II: CCIE Professional Development (2nd Edition)
Data Communications and Computer Networks: A Business User's Approach
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Casting Light on the Dark Web: A Guide for Safe Exploration (LITA Guides)
Data Center Handbook
Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and Shell Programming
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition
The Hacker Playbook 3: Practical Guide To Penetration Testing
BlackBerry PlayBook For Dummies
Arial, the YouTuber (UnicornPreneur)
Kindle Touch For Dummies Portable Edition
Satellite Communications, Fourth Edition (Professional Engineering)
The Irony of Regulatory Reform: The Deregulation of American Telecommunications
CompTIA Network+ N10-007 Exam Cram (6th Edition)
Build Your Own Transistor Radios: A Hobbyist's Guide to High-Performance and Low-Powered Radio Circuits
Google BigQuery: The Definitive Guide: Data Warehousing, Analytics, and Machine Learning at Scale
CCENT/CCNA ICND1 100-105 Official Cert Guide
iOS 8 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics
Testing In Python: Robust Testing For Professionals
Windows Server 2016: The Administrator's Reference
The Internet is a Playground: Irreverent Correspondences of an Evil Online Genius
Legal Issues in Information Security (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Incident Management for Operations
The Real Business of Blockchain: How Leaders Can Create Value in a New Digital Age
You Look Like a Thing and I Love You: How Artificial Intelligence Works and Why It's Making the World a Weirder Place
SAP Sales and Distribution Quick Configuration Guide: Advanced SAP Tips and Tricks with Variant Configuration (Color Edition Book)
Complex Network Analysis in Python: Recognize - Construct - Visualize - Analyze - Interpret
Alibaba: The House That Jack Ma Built
Secrets of the JavaScript Ninja
Network Security Through Data Analysis: From Data to Action
iPhone Obsessed: Photo editing experiments with Apps
The Internet Made Easy: Find What You've Been Searching For (Computers Made Easy)
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
The Book of Audacity: Record, Edit, Mix, and Master with the Free Audio Editor
All Data Are Local: Thinking Critically in a Data-Driven Society (The MIT Press)
Mastering Linux Shell Scripting: A practical guide to Linux command-line, Bash scripting, and Shell programming, 2nd Edition
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Introduction to Networks v6 Companion Guide
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
UNIX and Linux System Administration Handbook, 4th Edition
The Architecture of Computer Hardware, Systems Software, and Networking: An Information Technology Approach
EMI Troubleshooting Cookbook for Product Designers (Electromagnetic Waves)
The Four Agreements
Computers for Seniors: Email, Internet, Photos, and More in 14 Easy Lessons
Radar Handbook, Third Edition
Explain the Cloud Like I'm 10
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS (Networking Technology: Security)
AWS Certified Solutions Architect Associate Training Notes 2019: Fast-track your exam success with the ultimate cheat sheet for the SAA-C01 exam
My Funny Personal Password Book With Alphabetical Tabs: Forgetfulness Is A Sign Of Genius - Great Discreet Organizer To Protect All Your Online ... Log book, Keeper Tracker (6x9 110 pages)
Professional Flash Mobile Development: Creating Android and iPhone Applications
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Windows 10: Essentials for Administration (IT Pro Solutions)
Journal and Workbook: Scam Me If You Can: Checklists, Action Plans and Journal and Notes Pages to Track Your Progress & Results
Go in Action
iPad: The Missing Manual: The Missing Manual
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Beginning Android Games
Understanding Linux Network Internals: Guided Tour to Networking on Linux
The Road to GraphQL: Your journey to master pragmatic GraphQL in JavaScript with React.js and Node.js
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition
Fixing Your Scrum: Practical Solutions to Common Scrum Problems
Army Techniques Publication ATP 3-21.8 Infantry Platoon and Squad April 2016
iOS Games by Tutorials: Second Edition: Beginning 2D iOS Game Development with Swift
Internet Password Organizer: Enchanted (Discreet Password Journal)
SEO For Dummies (For Dummies (Computer/Tech))
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Practical Windows Forensics
Windows Server 2016 Essentials Installation Guide for Small Businesses
Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code
VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510
Functional Web Development with Elixir, OTP, and Phoenix: Rethink the Modern Web App
How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
Secure Enough?: 20 Questions on Cybersecurity for Business Owners and Executives
Reality Is Broken: Why Games Make Us Better and How They Can Change the World
Essential Guide to RF and Wireless, The
Introducing iOS 8: Swift Programming from Idea to App Store
Windows For Tablets For Dummies
My iPad mini (My...)
Secrets of Analytical Leaders: Insights from Information Insiders
Network Programmability and Automation: Skills for the Next-Generation Network Engineer
Design It!: From Programmer to Software Architect (The Pragmatic Programmers)
Understanding Digital Signal Processing (3rd Edition)
The Dog: The Password Organizer Log That Looks Like a Regular Book (Hidden in Plain View) (Volume 6)
Networking All-in-One For Dummies
Hands-On Cloud Administration in Azure: Implement, monitor, and manage important Azure services and components including IaaS and PaaS
Analysis and Design of Next-Generation Software Architectures: 5G, IoT, Blockchain, and Quantum Computing
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Behind the Screen: Content Moderation in the Shadows of Social Media
Patterns of Enterprise Application Architecture
Introduction to Information Theory and Data Compression (Applied Mathematics)
Im Abbreviations, Texting & Emoticons (Quick Study Computer)
iOS 5 Programming Cookbook: Solutions & Examples for iPhone, iPad, and iPod touch Apps
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
Password Book Organizer Alphabetical: 8.5 x 11 Password Notebook with Tabs Printed | Smart Black Design
Beginning Android Tablet Application Development
Android Tablets in easy steps
Satellite Communications
Growing Up Social: Raising Relational Kids in a Screen-Driven World
Database Reliability Engineering: Designing and Operating Resilient Database Systems
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
OCA/OCP Oracle Database 12c All-in-One Exam Guide (Exams 1Z0-061, 1Z0-062, & 1Z0-063)
Programming the Finite Element Method in Java and Android
IT Auditing Using Controls to Protect Information Assets, Third Edition
System Forensics, Investigation and Response with Cloud Labs (Information Systems Security & Assurance)
Windows Server 2016 Inside Out (includes Current Book Service)
Auditing IT Infrastructures for Compliance (Information Systems Security & Assurance)
The Car Hacker's Handbook: A Guide for the Penetration Tester
Cyber Dragon: Inside China's Information Warfare and Cyber Operations (Praeger Security International)
Hybrid Cloud For Dummies
Information Technology Control and Audit, Fifth Edition
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
File System Forensic Analysis
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd Edition
Hacking: 4 Books in 1- Hacking for Beginners, Hacker Basic Security, Networking Hacking, Kali Linux for Hackers
Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Guidelines
Cnc Machining Handbook: Building, Programming, and Implementation
CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition
iOS 8 Application Development in 24 Hours, Sams Teach Yourself: iOS Appl Deve 24 Hour Sams Te_6
Entity Framework Core in Action
CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide (5th Edition) (Certification Guide)
Satellite Communications Systems Engineering: Atmospheric Effects, Satellite Link Design and System Performance
Digital Image Processing (With CD-ROM)
Electronic Commerce
Nurse Management Demystified
Advanced Penetration Testing: Hacking the World's Most Secure Networks
I Forgot My Password: Internet Password Organizer (Alphabetical Order of Pages)
High Performance Browser Networking: What Every Web Developer Should Know About Networking And Web Performance
Electric Motor Maintenance and Troubleshooting, 2nd Edition
The Art of Deception: Controlling the Human Element of Security
Cybersecurity for Beginners
Embedded Linux Development Using Yocto Project Cookbook: Practical recipes to help you leverage the power of Yocto to build exciting Linux-based systems, 2nd Edition
MIS (with MindTap Printed Access Card) (New, Engaging Titles from 4LTR Press)
Hadoop: The Definitive Guide: Storage and Analysis at Internet Scale
The Genius of the System: Hollywood Filmmaking in the Studio Era
JIRA Strategy Admin Workbook: Templates for the application administrator to set up, clean up, and maintain JIRA
Digital Communications: Fundamentals and Applications (Paperback) (2nd Edition) (Prentice Hall Communications Engineering and Emerging Technologies Series from Ted Rappaport)
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)
SSH, The Secure Shell: The Definitive Guide: The Definitive Guide
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
Network Security Assessment: Know Your Network
The Internet of Money
Docker in Practice
UDL in the Cloud!: How to Design and Deliver Online Education Using Universal Design for Learning
Architecting Modern Data Platforms: A Guide to Enterprise Hadoop at Scale
Learn Docker - Fundamentals of Docker 18.x: Everything you need to know about containerizing your applications and running them in production
Incident Response & Computer Forensics, Third Edition
Practical Salesforce Development Without Code: Building Declarative Solutions on the Salesforce Platform
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
Extreme Privacy: What It Takes to Disappear in America
Junos Enterprise Switching
Programming iOS 6
The App Factory Playbook: How You Can Develop Your App Idea Without Learning to Code and Without a Technical Co-Founder
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
Kotlin in Action
Implementing SSL/TLS
Don't Make Me Think, Revisited: A Common Sense Approach to Web Usability (3rd Edition) (Voices That Matter)
Lessons Learned in Software Testing: A Context-Driven Approach
iPad and iPhone Tips and Tricks (covers iPhones and iPads running iOS 8): iPad and iPhone Tips and Tr_p4
Ionic 2 Cookbook - Second Edition
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud
Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) (Mike Meyers' Certification Passport)
Stream Processing with Apache Flink: Fundamentals, Implementation, and Operation of Streaming Applications
Sencha Touch in Action
CompTIA Network+ Certification Study Guide, Seventh Edition (Exam N10-007)
Active Directory: Designing, Deploying, And Running Active Directory
Computer Science Principles: The Foundational Concepts of Computer Science - For AP® Computer Science Principles
Programming MapReduce with Scalding
R in Action: Data Analysis and Graphics with R
Effective Cybersecurity: A Guide to Using Best Practices and Standards
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
Linux Operations and Administration
Urban Computing (Information Systems)
AWS Certified Cloud Practitioner Practice Tests 2019: 390 AWS Practice Exam Questions with Answers & detailed Explanations
Tor and the Deep Web: Bitcoin, DarkNet & Cryptocurrency (2 in 1 Book) 2017-18: NSA Spying Defeated
Apps for Learning: 40 Best iPad/iPod Touch/iPhone Apps for High School Classrooms (The 21st Century Fluency Series)
Data and Reality: A Timeless Perspective on Perceiving and Managing Information in Our Imprecise World, 3rd Edition
Dropbox In 30 Minutes (2nd Edition): The Beginner's Guide To Dropbox Backup, Syncing, And Sharing
Computer Networks and Internets (6th Edition)
Microsoft® Mobile Development Handbook (Developer Reference)
Windows PowerShell Pocket Reference: Portable Help for PowerShell Scripters (Pocket Reference (O'Reilly))
Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud
Foundations of Information Security: A Straightforward Introduction
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
SNMP Mastery (IT Mastery Book 15)
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Principles of Computer Security, Fourth Edition (Official Comptia Guide)
The Squiggly Career: Ditch the Ladder, Embrace Opportunity and Carve Your Own Path Through the Squiggly World of Work
5G New Radio in Bullets (Colour)
Ansible Playbook Essentials: Design automation blueprints using Ansible's playbooks to orchestrate and manage your multitier infrastructure
Hands-On Network Programming with C# and .NET Core: Build robust network applications with C#and .NET Core
The Hello Girls: America’s First Women Soldiers
Unofficial Guide to FamilySearch.org: How to Find Your Family History on the Largest Free Genealogy Website
CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
Programming iOS 7
Network+ Guide to Networks
Windows 8 Apps with HTML5 and JavaScript Unleashed
Beyond the Valley: How Innovators around the World are Overcoming Inequality and Creating the Technologies of Tomorrow (The MIT Press)
Seeking SRE: Conversations About Running Production Systems at Scale
Gen Z Effect: The Six Forces Shaping the Future of Business
Cybersecurity: A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z
Google Nexus 7 (Android 4.4 KitKat Edition)
Computer Security: Art and Science
The Photoshop Toolbox: Essential Techniques for Mastering Layer Masks, Brushes, and Blend Modes
Segment Routing Part I
Burners & Black Markets - How to Be Invisible
Android Studio 2 Development Essentials
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Shit I can't remember: Internet ID Password Keeper Address Logbook Passkey Record Journal Notebook Organizer Men, Women (Internet Password Login ID Logbook Journal Organizer Series) (Volume 10)
Internet Password Organizer: Flourish (Discreet Password Journal)
Pro SQL Server Internals
Network Flows: Theory, Algorithms, and Applications
Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe
iPad in Education For Dummies
Password Log Book: Address Books For Passwords, Password Journal Alphabetical, Login Password Book, Password Organizer Book, Vintage/Aged Cover (Volume 55)
Data Smart: Using Data Science to Transform Information into Insight
Zero Trust Networks: Building Secure Systems in Untrusted Networks
A Simple Guide to Verizon iPhone 4 (Simple Guides)
Modern Authentication with Azure Active Directory for Web Applications (Developer Reference)
Eleventh Hour CISSP®: Study Guide
Computer Networks and Systems: Queueing Theory And Performance Evaluation
The Joy of Search: A Google Insider's Guide to Going Beyond the Basics (The MIT Press)
Troubleshooting with the Windows Sysinternals Tools
Making Websites Win: Apply the Customer-Centric Methodology That Has Doubled the Sales of Many Leading Websites
Google Apps Made Easy: Learn to work in the cloud (Computers Made Easy Book 7)
Kali Linux: Simple and Effective Approach to Learn Kali Linux
Trace Your German Roots Online: A Complete Guide to German Genealogy Websites
Internet Routing Architectures (2nd Edition)
iPhone 11 Guide: The Manual for Beginners, Dummies, Seniors & for All iPhone Users (Updated 2020 Tips & Tricks Version with Index and Colorful Images) (White & Grey Color Printed Version)
Signal and Power Integrity - Simplified (3rd Edition) (Prentice Hall PTR Signal Integrity Library)
A Broadcast Engineering Tutorial for Non-Engineers
The Cloud Adoption Playbook: Proven Strategies for Transforming Your Organization with the Cloud
Security Awareness: Applying Practical Security in Your World
Learning Linux Binary Analysis
Social Engineering, Second Edition: The Science of Human Hacking
An Introduction to Design Science
R in Action
Telecommunications Wiring (3rd Edition)
iPhone 11: The iPhone Manual for Beginners, Seniors & for All iPhone Users (The Simplified Manual for Kids and Adults)
Save me: Password Logbook with Alphabetical Tabs, Social Media Password Page, Good Keeper for Protecting and Organize All Your Password Records
My iPad
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
Microsoft SharePoint 2016 Introduction Quick Reference Guide - Windows Version (Cheat Sheet of Instructions & Tips - Laminated Card)
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Pragmatic AI: An Introduction to Cloud-Based Machine Learning (Addison Wesley Data & Analytics)
iOS Animations by Tutorials Fourth Edition: iOS 11 and Swift 4 Edition
Practical Antenna Handbook 5/e
Learn Cisco Network Administration in a Month of Lunches
Photoshop for Lightroom Users (2nd Edition) (Voices That Matter)
Mechatronics for the Evil Genius: 25 Build-it-Yourself Projects
Adventures in the Screen Trade: A Personal View of Hollywood and Screenwriting
Machine Learning for Text
Microservices Patterns: With examples in Java
The Unicorn Project: A Novel About Developers, Digital Disruption, and Thriving in the Age of Data
The Mathematical Theory of Communication
Head First Android Development: A Brain-Friendly Guide
Windows Nt Server 4.0 McSe Study Guide
Bloomberg by Bloomberg
Tips and Tricks for the iPad with iOS 8 and higher for Seniors (also for iOS 9): Get More Out of Your iPad (Computer Books for Seniors series)
My New iPad: A User's Guide (3rd Edition) (My New... (No Starch Press))
Inside Network Perimeter Security (2nd Edition)
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Mastering Ansible: Effectively automate configuration management and deployment challenges with Ansible 2.7, 3rd Edition
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)
Delivering Business Intelligence with Microsoft SQL Server 2016, Fourth Edition
Building Data Centers with VXLAN BGP EVPN: A Cisco NX-OS Perspective (Networking Technology)
Complete Idiot's Guide to MP3: Music on the Internet
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Mastering Active Directory: Understand the Core Functionalities of Active Directory Services Using Microsoft Server 2016 and PowerShell
iOS Animations by Tutorials Third Edition: iOS 10 and Swift 3 edition
Just Breathe: Ocean Theme Login Password Book - Small Internet Password Organizer & Logbook (4x6) - Discrete Password Keeper Journal with Alphabet Tabs for Easy Organization of Online Account Details
iPhone: The Missing Manual
iPad All-in-One For Dummies
EW 104: EW Against a New Generation of Threats
An Introduction to Kolmogorov Complexity and Its Applications (Texts in Computer Science)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
CompTIA Security+ SY0-501 Cert Guide (4th Edition) (Certification Guide)
The Unfinished Nation: A Concise History of the American People
CTS-I Certified Technology Specialist-Installation Exam Guide
CERTIFIED AUTHORIZATION PROFESSIONAL (CAP): EXAM QUESTIONS AND ANNOTATED ANSWERS; JOB INTERVIEW PREP AND POSSIBLE INTERVIEW QUESTIONS
Advanced API Security: OAuth 2.0 and Beyond
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
The Little Engineer Coloring Book: Space and Rockets: Fun and Educational Coloring Book for Preschool and Elementary Children
TCP/IP Illustrated: v. 3: TCP for Transactions, HTTP, NNTP and the Unix Domain Protocols (Addison-Wesley Professional Computing Series)
My iPad 2 (covers iOS 5) (3rd Edition)
Mastering Microsoft Exchange Server 2016
Salesforce Lightning Platform Enterprise Architecture: Architect and deliver packaged applications that cater to enterprise business needs, 3rd Edition
iOS 8 App Development Essentials
5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio Standards
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Introduction to Information Retrieval
Getting Real: The Smarter, Faster, Easier Way to Build a Successful Web Application
Test-Driven iOS Development with Swift 3
Sorting Things Out: Classification and Its Consequences (Inside Technology)
Foundations of Algorithms
Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP (Networking Technology)
Learning iPad Programming: A Hands-On Guide to Building iPad Apps
SIP - Understanding the Session Initiation Protocol
Decode and Conquer: Answers to Product Management Interviews
CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902)
Ubuntu 18.04 LTS Desktop: Applications and Administration
I'll Never Forget You: 6x9 Internet Password Logbook Large Print with Tabs | Flower Design Teal Color
Learning SaltStack
Swipe to Unlock: The Primer on Technology and Business Strategy
Newton's Telecom Dictionary
Ethical Hacking: A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking
Troubleshooting and Repairing Major Appliances
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the UNIX Operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line
Lights Out: A Cyberattack, a Nation Unprepared, Surviving the Aftermath
Practical Cloud Security: A Guide for Secure Design and Deployment
Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts.
The Hamster Revolution: How to Manage Your Email Before It Manages You (Bk Business)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (2nd Edition) (Networking Technology)
Android Programming for Beginners: Build in-depth, full-featured Android 9 Pie apps starting from zero programming experience, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
EMC for Product Designers
Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
Fundamentals of Photonics, 2 Volume Set (Wiley Series in Pure and Applied Optics)
Unity 5 Game Optimization
Head First Kotlin: A Brain-Friendly Guide
Salesforce Marketing Cloud For Dummies
Pro Power BI Desktop
Information Security Policies, Procedures, and Standards: A Practitioner's Reference
MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
iOS 7 App Development Essentials
Weight Watchers Freestyle Cookbook: The Beginners Guide To SmartPoints And Weight Watchers (WW Cookbook Book 1)
Modern Optical Engineering, 4th Ed.
Making Things Move Diy Mechanisms for Inventors, Hobbyists, and Artists
Swift in Depth
Disney Facts Revealed: Answers to Fans Curious Questions (Disney Editions Deluxe)
The iOS 5 Developer's Cookbook: Core Concepts and Essential Recipes for iOS Programmers (Developer's Library)
Top-Down Network Design (3rd Edition)
The Principles of Beautiful Web Design: Designing Great Web Sites is Not Rocket Science!
Unity Artificial Intelligence Programming: Add powerful, believable, and fun AI entities in your game with the power of Unity 2018!, 4th Edition
Practical Deep Learning for Cloud, Mobile, and Edge: Real-World AI & Computer-Vision Projects Using Python, Keras & TensorFlow
Windows Home Networking Made Easy: Home and Small Office Connectivity (Computers Made Easy)
Shit I Can't Remember: password book, password log book and internet password organizer, alphabetical password book, Logbook To Protect Usernames and ... notebook, password book small 6” x 9”
PoC or GTFO
Pro iOS Table Views: for iPhone, iPad, and iPod touch
Search Engine Optimization All-in-One For Dummies
Computer Networking for Beginners: Your Guide for Mastering Computer Networking, Cisco IOS and the OSI Model (Computer Networking Series)
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Apple Pro Training Series: Compressor 3.5
CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003)
Web Analytics 2.0: The Art of Online Accountability and Science of Customer Centricity
Security Metrics: Replacing Fear, Uncertainty, and Doubt
How the Internet Happened
JavaScript: The Good Parts
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition
Exam Ref AZ-300 Microsoft Azure Architect Technologies
Learn Unity 4 for iOS Game Development (Technology in Action)
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
The Wrong Kind of Women: Inside Our Revolution to Dismantle the Gods of Hollywood
Infrastructure as Code
5G Core Networks: Powering Digitalization
How to Do (Just About) Anything on the Internet: Make the Internet Work for You―Great Advice for New Users and Seasoned Pros Alike
Docker Quick Start Guide: Learn Docker like a boss, and finally own your applications
Learning Xcode 8
The Road to React: Your journey to master plain yet pragmatic React.js
Discrete-Time Signal Processing (3rd Edition) (Prentice-Hall Signal Processing Series)
Apache Spark in 24 Hours, Sams Teach Yourself
ASP.NET Core in Action
Mastering Windows PowerShell Scripting: Automate and manage your environment using PowerShell Core 6.0, 3rd Edition
Android Recipes: A Problem-Solution Approach
Python for DevOps: Learn Ruthlessly Effective Automation
Google Apps for Littles: Believe They Can
High Performance MySQL: Optimization, Backups, and Replication
Android Hacker's Handbook
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)
Complete Idiot's Guide to MP3: Music on the Internet
Podcasting Bible
Driving Digital Strategy: A Guide to Reimagining Your Business
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
The Enterprise Big Data Lake: Delivering the Promise of Big Data and Data Science
TCP/IP Illustrated: The Implementation, Vol. 2
CompTIA Linux+ Certification All-in-One Exam Guide: Exam XK0-004
PowerPoint 2016 For Dummies
The Movie Business Book
Antenna Engineering Handbook
The SAP Material Master - a Practical Guide
Hackers & Painters: Big Ideas From The Computer Age
Cisco Networking All-in-One For Dummies
Shit I Can't Remember: Alphabetical Organizer and Notebook for Passwords and Shit (Journal for Men and Women)
Pro SQL Server 2019 Administration: A Guide for the Modern DBA
Programming Google Glass
The Boogeyman Exists; And He's In Your Child's Back Pocket (2nd Edition): Internet Safety Tips & Technology Tips For Keeping Your Children Safe ... Social Media Safety, and Gaming Safety
Detection Theory: A User's Guide
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 12)
Absolute FreeBSD, 3rd Edition: The Complete Guide to FreeBSD
iPad 2 Portable Genius
Security Engineering: A Guide to Building Dependable Distributed Systems
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
High Speed Signal Propagation: Advanced Black Magic
Viral Parenting: A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
Cryptography Engineering: Design Principles and Practical Applications
Asterisk: The Definitive Guide: Open Source Telephony for the Enterprise
The Big Switch: Rewiring the World, from Edison to Google
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
iOS Game Development By Example
The Personal Internet Address & Password Logbook (Removable cover band for security)
Go in Practice: Includes 70 Techniques
Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition)
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
Stealing Your Life: The Ultimate Identity Theft Prevention Plan
Vue.js in Action
Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Reality Is Broken: Why Games Make Us Better and How They Can Change the World
The Undersea Network (Sign, Storage, Transmission)
Here Comes Everybody: The Power of Organizing Without Organizations
iOS 7 By Tutorials
Process Mining: Data Science in Action
CompTIA CySA+ Cybersecurity Analyst Certification Bundle (Exam CS0-001)
Decode to Encode: Master Complex Concepts Faster, Bridge Gaps and Be the Expert in Video Coding
AWS Certified Solutions Architect Official Study Guide: Associate Exam (Aws Certified Solutions Architect Official: Associate Exam)
Statistical Analysis of Network Data with R (Use R!)
UX for Lean Startups: Faster, Smarter User Experience Research and Design
Microsoft SharePoint 2013 Step by Step
Amazon Web Services in Action
Math Word Problems Demystified 2/E
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI
Antenna Theory and Design
Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
Software Estimation Without Guessing: Effective Planning in an Imperfect World
Pro Git
iOS 10 Programming for Beginners
New Perspectives on the Internet, Comprehensive
SharePoint For Dummies (For Dummies (Computer/Tech))
Iphone: Covers All Models With 3.0 Software-including the Iphone 3gs (Missing Manual)
Journal and Workbook: Scam Me If You Can: Checklists, Action Plans and Journal and Notes Pages to Track Your Progress & Results
Fundamentals of Antennas: Concepts and Applications (SPIE Tutorial Texts in Optical Engineering Vol. TT50)
Hello Swift!: iOS app programming for kids and other beginners
NetSuite ERP for Administrators: Learn how to install, maintain, and secure a NetSuite implementation, using the best tools and techniques
The Everything Guide to Online Genealogy: Trace Your Roots, Share Your History, and Create Your Family Tree
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Oracle Cloud Infrastructure Architect Associate All-in-One Exam Guide (Exam 1Z0-1072)
Windows 10: The Missing Manual: The book that should have been in the box
CISM Certified Information Security Manager Practice Exams
Windows 10 Inside Out (3rd Edition)
The iPad Air and iPad mini Pocket Guide: iPad iPad min Pock G ePub_5
Getting StartED with Google Apps
Affiliate Program Management: An Hour a Day
The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think
Essential C# 7.0 (6th Edition) (Addison-Wesley Microsoft Technology Series)
Django 2 by Example: Build powerful and reliable Python web applications from scratch
Dictionary of Computer and Internet Terms (Barron's Business Dictionaries)
How to Do Everything: Genealogy, Fourth Edition
Microsoft Windows Server Administration Essentials
IP Subnetting - From Zero to Guru
Fiber Network Service Survivability (Artech House Telecommunications Library)
Adobe Photoshop CC Classroom in a Book (2018 release)
Blockchain Bubble or Revolution: The Present and Future of Blockchain and Cryptocurrencies
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
Object-Oriented Data Structures Using Java
iPhone 11: The Beginner’s Guide for All Dummies and Senior Users of the New iPhone Devices (Color Printed Version)
Cisco Firepower Threat Defense (FTD) (Networking Technology: Security)
Serious Cryptography: A Practical Introduction to Modern Encryption
The Browser Hacker's Handbook
Android Developer Tools Essentials: Android Studio to Zipalign
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security
Software Security: Building Security In
The Art of Computer Programming, Volume 4, Fascicle 6: Satisfiability
AWS Lambda in Action: Event-driven serverless applications
Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Designing Bots: Creating Conversational Experiences
Yesterday's Tomorrow: Disney's Magical Mid-Century
Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Camel in Action
Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory (v. 1)
Android Application Development Cookbook: 93 Recipes for Building Winning Apps
Pro HTML5 Accessibility
Cloud Services in a Month: Build a Successful Cloud Service Business in 30 Days
Geoprocessing with Python
Programming Bitcoin: Learn How to Program Bitcoin from Scratch
Microsoft 365 Business for Admins For Dummies (For Dummies (Computer/Tech))
Microsoft Visual Basic 2017 for Windows, Web, and Database Applications: Comprehensive (Shelly Cashman)
CCNA Security (210-260) Portable Command Guide
Salesforce Advanced Administrator Certification Guide: Become a Certified Advanced Salesforce Administrator with this exam guide
Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Elementary Information Security
Developing Cybersecurity Programs and Policies (Pearson IT Cybersecurity Curriculum (ITCC))
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Time Management for System Administrators
DNS and BIND (5th Edition)
iPad Apps For Kids For Dummies
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity
Network+ Guide to Networks
Essential Chromebook: The Illustrated Guide to Using Chromebook (Computer Essentials)
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
Swift 4 Protocol-Oriented Programming: Bring predictability, performance, and productivity to your Swift applications, 3rd Edition
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
CompTIA Security+ Guide to Network Security Fundamentals - Standalone Book
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition
Invitation to Computer Science
Guide to Network Defense and Countermeasures
Corporate Computer Security (4th Edition)
Starting an Online Business For Dummies
Network Information Theory
802.11 Wireless Networks: The Definitive Guide, Second Edition
OpenStack for Architects: Design production-ready private cloud infrastructure, 2nd Edition
5G Simplified: ABCs of Advanced Mobile Communications
Adobe InDesign CC Classroom in a Book (2019 Release)
The Shallows: What the Internet Is Doing to Our Brains
Emotional Design: Why We Love (or Hate) Everyday Things
Migrating to SAP S/4HANA
Learn Wireshark: Confidently navigate the Wireshark interface and solve real-world networking problems
Shit I Can't Remember Internet Address & Password Logbook: Premium Alphabetical Organizer To Protect Usernames and Passwords (Pink Pastel Floral)
Get Programming with Node.js
Corporate Communication: Critical Business Asset for Strategic Global Change
RHCSA/RHCE Red Hat Linux Certification Study Guide, Seventh Edition (Exams EX200 & EX300)
Cybersecurity and Cyberwar: What Everyone Needs To Know®
Shit I'm supposed to remember: Internet Password Logbook, Organizer, Tracker, Funny White Elephant Gag Gift, Secret Santa Gift Exchange Idea
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
Network Attacks and Exploitation: A Framework
The Radio Today guide to the Icom IC-7300
Learning Chef: A Guide to Configuration Management and Automation
Virtualization Essentials, 2nd Edition
Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement
Penetration Testing: A Hands-On Introduction to Hacking
Take Back Your Life! Using Microsoft Office Outlook to Get Organized and Stay Organized
Product Management in Practice: A Real-World Guide to the Key Connective Role of the 21st Century
Be the Greatest Product Manager Ever: Master Six Proven Skills to Get the Career You Want
Principles of Information Security
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, including the Basics of Cybersecurity & The Internet of Things for Artificial Intelligence
Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals
Ansible for DevOps: Server and configuration management for humans
Healthcare Information Security and Privacy
Electromagnetic Compatibility Engineering
My iPhone (covers iOS 5 running on iPhone 3GS, 4 or 4S) (5th Edition)
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Junos Enterprise Routing: A Practical Guide To Junos Routing And Certification
Google Drive & Docs in 30 Minutes (2nd Edition): The unofficial guide to the new Google Drive, Docs, Sheets & Slides
Adobe Photoshop CC Classroom in a Book (2019 Release)
Elasticsearch 7.0 Cookbook: Over 100 recipes for fast, scalable, and reliable search for your enterprise, 4th Edition
Linux Bible
The Ultimate Tesla Coil Design and Construction Guide
iOS 9 App Development Essentials: Learn to Develop iOS 9 Apps Using Xcode 7 and Swift 2
Smart Business: What Alibaba's Success Reveals about the Future of Strategy
Introduction to Computing Systems: From Bits and Gates to C and Beyond
APPLICATION EXPERIENCE: A Practical Guide for IT & Technology Leaders in the Age of Digital Transformation, DevOps & Software Defined Everything
In the Plex: How Google Thinks, Works, and Shapes Our Lives
iOS Animations by Tutorials Second Edition: iOS 9 & Swift 2 Edition
Going Text: Mastering the Power of the Command Line
Springer Handbook of Global Navigation Satellite Systems (Springer Handbooks)
Networks, Crowds, and Markets: Reasoning about a Highly Connected World
Password Journal: Premium Alphabetical Notebook And Logbook To Protect Usernames and Passwords (Starry Night)
Software Estimation: Demystifying the Black Art (Developer Best Practices)
Group Policy: Fundamentals, Security, and the Managed Desktop
SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL
101 Labs - Cisco CCNP: Hands-on Practical Labs for the SWITCH, ROUTE and TSHOOT Exams
The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
IPTV and Internet Video, Second Edition: Expanding the Reach of Television Broadcasting (NAB Executive Technology Briefings)
CompTIA Server+ Certification All-in-One Exam Guide (Exam SK0-004)
The Tab Guide to Diy Welding: Hands-on Projects for Hobbyists, Handymen, and Artists
Teach Yourself VISUALLY Windows 10 Anniversary Update
Enterprise Blockchain Has Arrived: Real Deployments. Real Value.
Sams Teach Yourself Lotus Notes 4.6 in 24 Hours
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications
Computer Vision: Principles, Algorithms, Applications, Learning
CCTV: From Light to Pixels
Competing in the Age of AI: Strategy and Leadership When Algorithms and Networks Run the World
Windows Phone 8 Development Internals (Developer Reference)
Learning JavaScript Design Patterns
Password Logbook: The Personal Internet Address Book with Alphabetical Tabs, Large Print for Simple Password Keeping
Beginning PowerApps: The Non-Developers Guide to Building Business Mobile Applications
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
IBM Cognos Business Intelligence 10: The Official Guide
Learning Salesforce Lightning Application Development: Build and test Lightning Components for Salesforce Lightning Experience using Salesforce DX
Principles of Database Management: The Practical Guide to Storing, Managing and Analyzing Big and Small Data
Mastering Xamarin.Forms: App architecture techniques for building multi-platform, native mobile apps with Xamarin.Forms 4, 3rd Edition
Google AdWords For Dummies, 3rd Edition
Practical Automated Machine Learning on Azure: Using Azure Machine Learning to Quickly Build AI Solutions
Learn Adobe Illustrator CC for Graphic Design and Illustration: Adobe Certified Associate Exam Preparation (2nd Edition) (Adobe Certified Associate (ACA))
Iran Reframed: Anxieties of Power in the Islamic Republic (Stanford Studies in Middle Eastern and Islamic Societies and Cultures)
Decode and Conquer: Answers to Product Management Interviews
The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers
UX Strategy: How to Devise Innovative Digital Products that People Want
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services
Kubernetes: The Ultimate Guide to Learn and Master Kubernetes for Beginners and Advanced Users (2020 Edition)
Malware Data Science: Attack Detection and Attribution
Learning Visual Basic .Net
Password Book: Marigold ,Now you can log into your favorite social media sites, pay your bills, review your credit card statements, and shop at your ... stores, quickly and effortlessly! (Volume 21)
Release It!: Design and Deploy Production-Ready Software
Advanced Apex Programming in Salesforce
LinkedIn Profile Optimization FD (For Dummies (Career/Education))
Nmap 6 Cookbook: The Fat-Free Guide to Network Security Scanning
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS (Networking Technology: Security)
CompTIA Network+ Certification Premium Bundle: All-in-One Exam Guide, Seventh Edition with Online Access Code for Performance-Based Simulations, Video Training, and Practice Exams (Exam N10-007)
CompTIA Network+ Practice Tests: Exam N10-007
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
Quicken for Windows: The Official Guide, Eighth Edition (Quicken Guide)
AWS Certified Solutions Architect Associate Practice Tests 2019: 390 AWS Practice Exam Questions with Answers & detailed Explanations (Digital Cloud Training)
The Idea Factory: Bell Labs and the Great Age of American Innovation
Learn Adobe Photoshop CC for Visual Design: Adobe Certified Associate Exam Preparation (2nd Edition) (Adobe Certified Associate (ACA))
High Performance Spark: Best Practices for Scaling and Optimizing Apache Spark
iPad for Seniors in easy steps, 5th Edition: Covers iOS 9
Deploying SharePoint 2019: Installing, Configuring, and Optimizing for On-Premises and Hybrid Scenarios
Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
PowerShell for Office 365: Automate Office 365 administrative tasks
The Personal Internet Address & Password Logbook (removable cover band for security)
Adobe Photoshop Lightroom CC - Edit Like a Pro: (2018 Release)
Tcl/Tk Programmer's Reference
Internet Password Logbook (Cognac Leatherette): Keep track of: usernames, passwords, web addresses in one easy & organized location
Practical Signal Processing
How to Do Everything: iPhone 5
RF Microelectronics (2nd Edition) (Prentice Hall Communications Engineering and Emerging Technologies Series from Ted Rappaport)
CISSP All-in-One Exam Guide, Seventh Edition
Observing the User Experience: A Practitioner's Guide to User Research
Keep Me: Password Manager Book, Website and Password Organizer with Alphabet Tabs
The Art of Computer Programming, Volume 4, Fascicle 5: Mathematical Preliminaries Redux; Introduction to Backtracking; Dancing Links
VMware vSphere 6.7 Data Center Design Cookbook: Over 100 practical recipes to help you design a powerful virtual infrastructure based on vSphere 6.7, 3rd Edition
Exam Ref AZ-203 Developing Solutions for Microsoft Azure
Mastering Python Networking: Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd Edition
HOW TO BECOME FAMOUS ON TIK TOK: A Complete Guide On How To Get More Likes And Views On Your Tiktok Videos, Increase Large Fan Base, Making Money And Becoming Famous On Tik Tok
Microservices in Action
iOS 8 SDK Development: Creating iPhone and iPad Apps with Swift (The Pragmatic Programmers)
Network Defense and Countermeasures: Principles and Practices: Principles and Practices (Pearson IT Cybersecurity Curriculum (ITCC))
Terraform: Up and Running: Writing Infrastructure as Code
Pattern Recognition
Access Control, Authentication, and Public Key Infrastructure (Jones & Bartlett Learning Information Systems Security)
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Computers Made Easy: From Dummy To Geek
Electromagnetic Compatibility Engineering
Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition
Splunk Operational Intelligence Cookbook: Over 80 recipes for transforming your data into business-critical insights using Splunk, 3rd Edition
Security Testing with Raspberry Pi
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
Routing and Switching Essentials v6 Companion Guide
The Data Warehouse Lifecycle Toolkit, 2nd Edition
ArcPy and ArcGIS - Second Edition: Automating ArcGIS for Desktop and ArcGIS Online with Python
Learn Command Line and Batch Script Fast: A course from the basics of Windows to the edge of networking
Ten Arguments for Deleting Your Social Media Accounts Right Now
NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence
Windows Phone 8 Unleashed
InfoPath with SharePoint 2013 How-To
AWS Certified SysOps Administrator Official Study Guide: Associate Exam
Learning ServiceNow: Administration and development on the Now platform, for powerful IT automation, 2nd Edition
HTML and JavaScript BASICS (BASICS Series)
Ethical Hacking: A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking
Future Crimes: Inside the Digital Underground and the Battle for Our Connected World
Adobe Photoshop CC Classroom in a Book (2017 release)
Podcasting: How to Start a Podcast and Create a Profitable Podcasting Business
SharePoint in Practice: Proven methods to engage your team & build your company portal.
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
Getting MEAN with Mongo, Express, Angular, and Node
Trigonometry Demystified 2/E
Defensive Security Handbook: Best Practices for Securing Infrastructure
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Kubernetes: Up and Running: Dive into the Future of Infrastructure
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
Long Term Evolution IN BULLETS, 2nd Edition (Black & White)
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life
Securing DevOps: Security in the Cloud
Learn Ansible: Automate cloud, security, and network infrastructure using Ansible 2.x
Shit I can't remember: Internet ID Password Keeper Address Logbook Passkey Record Journal Notebook Organizer Men, Women (Internet Password Login ID Logbook Journal Organizer Series) (Volume 9)
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Practical Monitoring: Effective Strategies for the Real World
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Learning SAS by Example: A Programmer's Guide, Second Edition: A Programmer's Guide, Second Edition
Networking for Systems Administrators (IT Mastery Book 5)
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
CompTIA Security+ Practice Tests SY0-501: Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam
My New iPad 2: A User's Guide
Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, ... Security (CCIE Professional Development)
Cracking the Technician License Exam
Neural Networks and Deep Learning: A Textbook
Object–Oriented Programming with Swift 2
Switching Power Supply Design, 3rd Ed.
Guide to TCP/IP: IPv6 and IPv4
iOS 8 App Development Essentials - Second Edition: Learn to Develop iOS 8 Apps using Xcode and Swift 1.2
Fiber Optics Installer (FOI) Certification Exam Guide
Windows Security Monitoring: Scenarios and Patterns
Programming Perl: Unmatched power for text processing and scripting
Active Directory For Dummies
Windows Command Line Administration Instant Reference
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition
Information Rules: A Strategic Guide to the Network Economy
Cracking the Technician License Exam
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
The FOA Reference Guide to Premises Cabling: Study Guide To FOA Certification
The Referral of a Lifetime: Never Make a Cold Call Again!
PowerShell for Sysadmins: Workflow Automation Made Easy
Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
iOS 10 by Tutorials: Learning the new iOS APIs with Swift 3
iOS 7 Application Development in 24 Hours, Sams Teach Yourself: iOS 7 Appl Dev in 24 H S T Y_p5 (Sams Teach Yourself -- Hours)
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide
Understanding Jitter and Phase Noise: A Circuits and Systems Perspective
Internet Password Organizer: Butterfly Effect (Discreet Password Journal)
TCP / IP For Dummies
CSSLP Certification All-in-One Exam Guide, Second Edition
The Linux Command Line: A Complete Introduction
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
CompTIA Network+ N10-007 Cert Guide (Certification Guide)
Tools and Tactics for the Master Day Trader: Battle-Tested Techniques for Day, Swing, and Position Traders
Bit by Bit: Social Research in the Digital Age
Blockbusters: Hit-making, Risk-taking, and the Big Business of Entertainment
Professional iPhone and iPad Database Application Programming
Mobile Marketing: How Mobile Technology is Revolutionizing Marketing, Communications and Advertising
Security in Computing: 5th Edition
Arista Warrior: Arista Products with a Focus on EOS
Security for Service Oriented Architectures
The Radio Today guide to the Icom IC-9700
Password Keeper: Internet Password Book with Alphabetical Tabs, Large Print Password Organizer, Password Logbook Small 6 x 9
Forget Me Not: Internet Password Logbook Organizer with Alphabetical Tabs, Large Print for Easy Password Keeping
Essential Windows Phone 8: Essen Windo Phone 8 _2 (Microsoft Windows Development Series)
Hacking for Beginners: A Step-by-Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
Cloud-Based Solutions for Healthcare IT
Corporate Communication: Strategic Adaptation for Global Practice
ArcGIS Pro 2.x Cookbook: Create, manage, and share geographic maps, data, and analytical models using ArcGIS Pro
Screens and Teens: Connecting with Our Kids in a Wireless World
Digital Citizenship in Schools: Nine Elements All Students Should Know
The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling
Dependency Injection Principles, Practices, and Patterns
The Essence of COM: A Programmer's Workbook (3rd Edition) (Prentice Hall Ptr Microsoft Technologies Series,)
Mastering Windows Server 2012 R2
"Is This Thing On?": A Friendly Guide to Everything Digital for Newbies, Technophobes, and the Kicking & Screaming
Junos Cookbook (Cookbooks (O'Reilly))
The Soul of Leadership: Unlocking Your Potential for Greatness
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
5G System Design: Architectural and Functional Considerations and Long Term Research
Creating HTML 5 Websites and Cloud Business Apps Using LightSwitch In Visual Studio 2013: Create standalone web applications and Office 365 / SharePoint 2013 applications
The Master Switch: The Rise and Fall of Information Empires
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)
Digital Transformation: Survive and Thrive in an Era of Mass Extinction
iPad 2: The Missing Manual
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
In the Shadows of the Net: Breaking Free of Compulsive Online Sexual Behavior
Learn Amazon Web Services in a Month of Lunches
The California Consumer Privacy Act (CCPA): An implementation guide
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
WTF Is My Password: password book, password log book and internet password organizer, alphabetical password book, Logbook To Protect Usernames and ... notebook, password book small 6” x 9”
Windows 10 for Enterprise Administrators: Modern Administrators' guide based on Redstone 3 version
Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure
Nurse Management Demystified
Official Google Cloud Certified Associate Cloud Engineer Study Guide