Israel in Egypt: The Evidence for the Authenticity of the Exodus ...
James K. Hoffmeier
Dispossession: The Performative in the Political
Judith P. Butler & Athena Athanasiou
DIY Boat Owner 2010.01 Spring
Unknown
The Past Through Tomorrow
Robert A. Heinlein
Breviary of the Gnostic Church of L. V. X
Paul Joseph Rovelli
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Forensic Computing
A. J. Sammes & Brian Jenkinson
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Penetration Testing for Dummies
Robert Shimonski
Beginning Ethical Hacking With Python
Sanjib Sinha
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena