Product Lifecycle Management (Volume 5): What Happens Across ...
John Stark
Hannah Arendt: For Love of the World
Elisabeth Young-Bruehl
There's No Such Thing as Free Speech, and It's a Good Thing, ...
Stanley Eugene Fish
Work and Weltanschauung - The Heidegger Controversy
Jürgen Habermas & John McCumber
The Vitalizing of Individual Powers
Ingo Swann
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
OpenStack in Action
Cody Bumgardner
Outlier Analysis
Charu C. Aggarwal
Pearls of Discrete Mathematics
Martin Erickson
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
The Private Production of Defense
Hans-Hermann Hoppe
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Production of Security, The
Gustave de Molinari
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Python Forensics
Chet Hosmer
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li