Scrum and XP From The Trenches: How We Do Scrum 2nd Ed.
Searching for a Corporate Savior: The Irrational Quest for Charismatic CEOs
Secrets & Lies: Digital Security in a Networked World
Secure Computing: Threats and Safeguards
Securing Client/Server Computer Networks
Securing Windows NT/2000 Servers for the Internet: Security Checklists for System Administrators
Security Architecture: Design, Deployment and Operations
Security Engineering: A Guide to Building Dependable Distributed Systems
Security in Distributed Computing: Did You Lock the Door?
Security Interface Specifications: Auditing and Authentication
Security Management: Business Strategies for Success
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Security & Privacy for E-business
sed & awk: UNIX Power Tools 2nd Ed.
Seeing What's Next: Using the Theories of Innovation to Predict Industry Change
Seizing the White Space: Business Modek Innovation for Growth and Renewal
Sekretess!: Handbok om sekretesslagstiftningen 9th Ed.
Selling the Invisible: A Field Guide to Modern Marketing
Selling the Wheel: Choosing the Best Way to Sell for You, Your Company, Your Customers