Natural Language Processing and Information Systems: 6th International ...
Birger Andersson & Maria Bergholtz & P. Johannesson
Your Call Is Important to Us
Laura Penny
The Linguistic Relativity Theory and Benjamin Lee Whorf - Essay
Christina McAfee
Gender
Ivan Illich
Henry Kissinger and the American Century
Jeremi Suri
Kali Linux Penetration Testing Bible
Gus Khawaja
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Grokking Web Application Security
Malcolm McDonald
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Penetration Testing for Dummies
Robert Shimonski
Network Troubleshooting Tools
Joseph Sloan
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley