
Cybercrime Law Through the Theoretical Lens of Relational Self
Irene Kamara
The AI Optimization Playbook
Dr. Chun Schiros, Supreet Kaur, Rajdeep Arora
Python Object-Oriented Programming
Steven F. Lott, Dusty Phillips
Kali Linux Cookbook
Corey P. Schultz
How to Prove Anything
B. McGraw
The Release Train Engineer Handbook
Glenn Smith, Tim Jackson, Gez Smith
Mastering Endpoint Management using Microsoft Intune Suite
Saurabh Sarkar, Rahul Singh, Rudy Ooms, Anoop C Nair

Volume 30 (2025): Issue 2
Forensic economic examination as a tool against economic crime under martial law in Ukraine
Inessa Ovsiannykova, Iryna Hubanova
Leveraging Large Language Models for Analysis and Control of Power Transmission Networks: Case Studies with the Llama3 LLM Model and Pandapower
Alen Bernadić
Methods to Prevent Commutation Failures in HVDC Systems
Vedat Taşdemir
First Report of Anguina pacificae Parasitizing Turfgrass in Washington
Emily Braithwaite, Chas J. Schmid, Alec R. Kowalewski, Katherine Fleming, Amy B. Peetz, Inga A. Zasada, Hannah M. Rivedal