Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Application of Graph Rewriting to Natural Language Processing
Guillaume Bonfante & Bruno Guillaume & Guy Perrier
Life is real only then, when "I am"
Georges Ivanovich Gurdjieff
Doing Research in Applied Linguistics: Realities, Dilemmas and ...
Heath Rose & Jim McKinley
Teaching English as a Second or Foreign Language
Marianne Celce-Murcia & Donna Brinton & Marguerite Ann Snow
A Handbook of Germanic Etymology
Vladimir E. Orel
A Cultural History of Pregnancy: Pregnancy, Medicine and Culture, ...
Clare Hanson
A Brief History of Ancient Astrology
Roger Beck
Philosophical Issues in Education: An Introduction
Cornel M. Hamm
High Theory/Low Culture
Mikita Brottman
Aristotle in China: Language, Categories and Translation
Robert Wardy
Modality and Tense: Philosophical Papers
Kit Fine
New York to Dallas
J. D. Robb
In Death (33)
The Gift of Fear: Survival Signals That Protect Us From Violence
Gavin de Becker
The FBI Way: Inside the Bureau's Code of Excellence
Frank Figliuzzi
Spycraft
H. Keith Melton & Henry Robert Schlesinger & Robert Wallace
Hack Proofing Your Network: Internet Tradecraft
Ryan Russell & Syngress Media, Inc
What Is Real?
Adam Becker
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Assessing the Tradecraft of Intelligence Analysis
Gregory F. Treverton & Claybourne Bryan Gabbard
The Devil in the White City: Murder, Magic & Madness and the ...
Erik Larson
The Beauty of What Remains: How Our Greatest Fear Becomes Our ...
Steve Leder
1491
Charles C. Mann
Women and the Gothic: An Edinburgh Companion
Avril Horner & Sue Zlosnik
Uncanny Modernity: Cultural Theories, Modern Anxieties
Jo Collins & John Jervis