Contributions to Universal Algebra
B. Csákány & Jurgen Schmidt
Vengeance: A Novel
Newt Gingrich & Pete Earley
Introduction to Fuzzy Sets, Fuzzy Logic, and Fuzzy Control Systems
Guanrong Chen & Trung Tat Pham
An Introduction to the Philosophy of Mathematics
Mark Colyvan
React Native in Action
Nader Dabit
Kali Linux Penetration Testing Bible
Gus Khawaja
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Grokking Web Application Security
Malcolm McDonald
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Penetration Testing for Dummies
Robert Shimonski
Network Troubleshooting Tools
Joseph Sloan
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley