Title: Implementing the Framework for Teaching in Enhancing Professional Practice: An ASCD Action Tool, Author: Charlotte Danielson
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: American Black Chamber, Author: Herbert O. Yardley
Title: The Elements of Statistical Learning: Data Mining, Inference, and Prediction / Edition 2, Author: Trevor Hastie
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Information Dashboard Design: Displaying Data for At-a-Glance Monitoring / Edition 2, Author: Stephen Few
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry / Edition 2, Author: Harlan Carvey
Title: An Intermediate Course in Probability / Edition 2, Author: Allan Gut
Title: Concrete Mathematics: A Foundation for Computer Science / Edition 2, Author: Ronald Graham
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: Structure and Interpretation of Computer Programs, second edition / Edition 2, Author: Harold Abelson
Title: System Engineering Analysis, Design, and Development: Concepts, Principles, and Practices / Edition 2, Author: Charles S. Wasson
Title: How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics / Edition 74, Author: N. Katherine Hayles
Title: Computer Architecture: A Quantitative Approach / Edition 6, Author: John L. Hennessy
Title: Memory as a Programming Concept in C and C++, Author: Frantisek Franek
Title: The Digital Humanities: A Primer for Students and Scholars, Author: Eileen Gardiner
Title: Spoken Natural Language Dialog Systems: A Practical Approach, Author: Ronnie W. Smith
Title: Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities / Edition 1, Author: Axel Simon

Pagination Links