Wuthering Heights
Emily Brontë
Decision Diagrams for Optimization
David Bergman & Andre A. Cire & Willem-Jan van Hoeve & John Hooker
A Modern Perspective on Type Theory: From Its Origins Until ...
F. D. Kamareddine & T. Laan & Rob Nederpelt
Passions and Perceptions: Studies in Hellenistic Philosophy ...
Martha Craven Nussbaum & Jacques Brunschwig
Foundations of Reasoning Under Uncertainty
Luis Magdalena & Bernadette Bouchon & Manuel Ojeda-Aciego & José-Luis Verdegay & Ronald R. Yager
Kali Linux Penetration Testing Bible
Gus Khawaja
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Grokking Web Application Security
Malcolm McDonald
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Penetration Testing for Dummies
Robert Shimonski
Network Troubleshooting Tools
Joseph Sloan
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley