Kitab Al-Muwatha Imam Malik
Imam Malik ra.
Linux Firewalls: Attack Detection and Response
Michael Rash
The LEGO Adventure Book, Vol. 1: Cars, Castles, Dinosaurs and ...
Megan H. Rothrock
Salinan 1.738) Pendidikan Dalam Perspektif Al Quran
Unknown
Wearable-Tech Projects With the Raspberry Pi Zero
Jon Witts
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
Become ITIL Foundation Certified in 7 Days: Learning ITIL Made ...
Abhinav Krishna Kaiser
Culture Matters: Decision-Making in Global Virtual Teams
Norhayati Zakaria
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: ...
Andrew Thu Pham
Maximizing Benefits From IT Project Management: From Requirements ...
José López Soriano
The Self-Made Program Leader: Taking Charge in Matrix Organizations
Steve Tkalcevich
Linux for Makers: Understanding the Operating System That Runs ...
Aaron Newcomb
Internet of Things for Architects: Architecting IoT Solutions ...
Perry Lea
ESP8266 Home Automation Projects: Leverage the Power of This ...
Catalin Batrinu
Internet of Things Programming Projects - Second Edition: Build ...
Colin Dow
Threat Modeling: Designing for Security
Adam Shostack
The Web Application Hacker's Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Microsoft Windows Networking Essentials
Darril Gibson
Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, ...
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Mastering Hyper-V 2012 R2 With System Center and Windows Azure
John Savill
Implementing Azure Solutions
Florian Klaffenbach & Jan-Henrik Damaschke & Oliver Michalski
From Techie to Boss: Transitioning to Leadership
Scott Cromar & David M. Jacobs
Cisco Networking Essentials
Troy McMillan
The Human Factor in Project Management
Denise Thompson
From Projects to Programs: A Project Manager's Journey
Samir Penkar
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Liars and Outliers: Enabling the Trust That Society Needs to ...
Bruce Schneier
Secrets and Lies: Digital Security in a Networked World
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Linux Server Security: Hack and Defend
Chris Binnie
Beginning Linux Programming
Neil Matthew & Richard Stones
Linux All-In-One for Dummies
Emmett Dulaney
The Practice of Network Security Monitoring: Understanding Incident ...
Richard Bejtlich
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols ...
Charles M. Kozierok
Financial Modeling for Business Owners and Entrepreneurs: Developing ...
Tom Y. Sawyer
Principles of Mobile Communication
Gordon L. Stüber
Guide to Computer Network Security
Joseph Migga Kizza
Fundamentals of Multimedia
Ze-Nian Li & Mark S. Drew & Jiangchuan Liu
Design Research in Information Systems: Theory and Practice
Alan Hevner & Samir Chatterjee
Industrial Sensors and Controls in Communication Networks: From ...
Dong-Seong Kim & Hoa Tran-Dang