A Defence of Poetry: An Essay
Percy Bysshe Shelley
My Mother, the Psychopath
Olivia Rayne
Viktor Schauberger, Implosion, Heft Nr 154
Viktor Schauberger
Hartford Puritanism: Thomas Hooker, Samuel Stone, and Their ...
Baird Tipson
The Scarlet Letter
Nathaniel Hawthorne & Margaret Brantley
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Crypto Dictionary
Jean-Philippe Aumasson
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Hacking for Dummies
Kevin Beaver
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Getting Started With OAuth 2.0
Ryan Boyd
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Linux Security Fundamentals
David Clinton
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain