|
Title |
Authors/Editors |
Publisher |
Type |
Copies |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
|
|
Wiley |
Books |
1 |
|
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
|
|
No Starch Press |
Books |
1 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
|
|
Wiley |
Books |
1 |
|
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
|
|
Syngress |
Books |
1 |
|
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
|
|
IT Revolution Press |
Books |
1 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
|
|
No Starch Press |
Books |
1 |
|
The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies
|
|
Brilliance Audio |
Books |
1 |
|
The Theory and Practice of Revenue Management (International Series in Operations Research & Management Science)
|
|
SPRİNGER |
Books |
1 |
|
TOGAF 9 Foundation Exam Study Guide: For busy architects who need to learn TOGAF 9 quickly
|
|
CreateSpace Independent Publishing Platform |
Books |
1 |
|
Toyota Kültürü
|
|
Optimist |
Books |
1 |