Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
Working Effectively With Legacy Code
Michael C. Feathers
Refactoring: Improving the Design of Existing Code
Martin Fowler & Kent Beck & John Brant & William Opdyke & Don Roberts
Linux Pocket Guide: Essential Commands
Daniel J. Barrett
Blockchain, IoT, and AI Technologies for Supply Chain Management: ...
Dr. Veena Grover & Dr. B. Balamurugan Balusamy & Dr. Mariofanna Milanova Dr. A. Yovan Felix