Computing Natural Language: Context, Structure, and Processes
Atocha Aliseda-Llera & Rob van Glabbeek & Dag Westerståhl
30 Days to a More Powerful Vocabulary
Funk & Norman Lewis
Vaccinology: Principles and Practice
Nadeem A. Sheikh & W. John W. Morrow & Clint S. Schmidt & D. Huw Davies
Equity Visits: A New Approach to Supporting Equity-Focused School ...
Rachel Roegman & David Allen & Larry Leverett & Scott Thompson & Thomas Hatch
Making America: A History of the United States, Volume 2: From ...
Carol Berkin & Christopher Miller & Robert Cherny & James Gormly & Douglas Egerton
Linux Security Fundamentals
David Clinton
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Andrew Adamatzky & Jemal H. Abawajy & Debashis de
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann