Living in the Long Emergency
James Howard Kunstler
Philosophy of the Buddha: An Introduction
Christopher Gowans
Transformation in Clinical and Developmental Psychology
Deirdre A. Kramer & Michael J. Bopp
Great books of the Western World - Volume 28
Encyclopaedia Britannica, Inc.
Barbarian Memory: The Legacy of Early Medieval History in Early ...
Nicholas Birns
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Forensic Computing
A. J. Sammes & Brian Jenkinson
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Penetration Testing for Dummies
Robert Shimonski
Beginning Ethical Hacking With Python
Sanjib Sinha
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena