Business Process Management: 7th International Conference, BPM ...
Hajo A. Reijers & Umeshwar Dayal & Johann Eder & Jana Koehler
An Introduction to Ramsey Theory: Fast Functions, Infinity, ...
Matthew Katz & Jan Reimann
Less Law, More Order: The Truth About Reducing Crime
Irvin Waller
The Surly Sullen Bell;: Ten Stories and Sketches, Uncanny or ...
Russell Kirk
German Language Learning: This Book includes: Learn German for ...
Language Building Lab
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
ASP.NET Core Security
Christian Wenz
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Advanced API Security: OAuth 2.0 and Beyond
Beginning Ethical Hacking With Python
Sanjib Sinha
Penetration Testing for Dummies
Robert Shimonski
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier