Funktionale und Applikative Programmierung: Grundlagen, Sprachen, ...
Wolfram Lippe
Reflections on the Christ
David Spangler
Merovingian Military Organization, 481-751
Bernard S. Bachrach
Berkshire Encyclopedia of Sustainability 9/10: Afro-Eurasia ...
Louis J. Kotzé
Edexcel AS and A level Mathematics Pure Mathematics Year 1AS ...
Harry Smith & Greg Attwood & Ian Bettison & Alan Clegg & Gill Dyer
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
OpenStack in Action
Cody Bumgardner
Outlier Analysis
Charu C. Aggarwal
Pearls of Discrete Mathematics
Martin Erickson
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
The Private Production of Defense
Hans-Hermann Hoppe
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Production of Security, The
Gustave de Molinari
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Python Forensics
Chet Hosmer
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li