Computational Cognitive Modeling and Linguistic Theory
Adrian Brasoveanu & Jakub Dotlačil
The Letter to the Galatians
David A. Desilva
New International Commentary on the New Testament (NICNT) (1)
Teaching English as a Foreign Language
Geoffrey Broughton & Christopher Brumfit
Open Letter to Charles Wright Mills
Michael Burawoy
Fuzzy PID Controllers for Industrial Applications - Lecture
G. Ron Chen
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
ASP.NET Core Security
Christian Wenz
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang