Top 1
|
 |
The Phoenix Project: A Novel about It, Devops, and Helping Your Business Win Gene Kim Trade Select(2018-04-16) £18.99
|
Top 2
|
 |
The Devops Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations Gene Kim Trade Select(2016-12-01) £19.99
|
Top 3
|
 |
Hello World: How to be Human in the Age of the Machine Hannah Fry Doubleday(2018-09-06) £18.99
|
Top 4 |
 |
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8e & CISSP Official (ISC)2 Practice Tests, 2e Mike Chapple Sybex(2018-08-10) £70.00
|
Top 5 |
 |
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World Marcus J Carey Independently published(2019-01-28) £15.99
|
Top 6 |
 |
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information Michael Bazzell CreateSpace Independent Publishing Platform(2018-01-26) £32.37
|
Top 7 |
 |
Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised ... Papers (Lecture Notes in Computer Science) Springer (2017-11-19) £79.99
|
Top 8 |
 |
Network Routing: Algorithms, Protocols, and Architectures (The Morgan Kaufmann Series in Networking) Deep Medhi Morgan Kaufmann(2017-09-11) £86.95
|
Top 9 |
 |
Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers (Lecture Notes in Computer Science) Springer (2019-04-21) £59.99
|
Top 10 |
 |
Linux Basics for Hackers , Getting Started with Networking, Scripting, and Security in Kali OccupyTheWeb No Starch Press(2018-11-15) £29.99
|
|
|