Breach
21Fantastic Beasts&Where to Find Them , Rowling J.K. (2018)
An approved textbook at Hogwarts School of Witchcraft and Wizardry since first publication, Fantastic Beasts and Where to Find Them is an indispensable guide to the magical beasts of the wizarding… 691 грн (только Украина)22Fantastic Beasts and Where to Find Them , Rowling J. (2018)
An approved textbook at Hogwarts School of Witchcraft and Wizardry since first publication, Fantastic Beasts and Where to Find Them is an indispensable guide to the magical beasts of the wizarding… 465 руб23Erosion in Geomechanics Applied to Dams and Levees , Stephane Bonelli
Erosion is the most common cause of failures at earth-dams, dikes and levees, whether through overtopping and overflowing, or internal erosion and piping. This book is dedicated to the phenomenon of… 14985.1 руб электронная книга24Fantastic Beasts and Where to Find Them. Hogwarts Library Book , Rowling Joanne (2018)
An approved textbook at Hogwarts School of Witchcraft and Wizardry since first publication, Fantastic Beasts and Where to Find Them is an indispensable guide to the magical beasts of the wizarding… 762 руб25The Network Security Test Lab. A Step-by-Step Guide , Michael Gregg
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement… 3860.83 руб электронная книга26Cybersecurity Law , Jeff Kosseff
A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an… 8879.91 руб электронная книга27Security Intelligence. A Practitioner's Guide to Solving Enterprise Security Challenges , Qing Li
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each… 4632.99 руб электронная книга28Risk Centric Threat Modeling. Process for Attack Simulation and Threat Analysis , Tony UcedaVelez
This book introduces the Process for Attack Simulation&Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces… 8493.82 руб электронная книга29The Billionaire's Defiant Wife , AMANDA BROWNING
From Miss Prim and Proper… Aimi Carteret has carved a new life for herself, and is determined to put her past behind her. But one man seems determined to breach her defences and Aimi has to resist… 120.15 руб электронная книга30Having The Cowboy's Baby , Stella Bagwell
Landy Wisdom was a survivor.Her former husband's abuse hadn't broken her spirit– no, she'd picked herself right up and helped run the local Underground Railroad for battered women. But when it came… 304.76 руб электронная книга