Boer War: A History From Beginning to End
Hourly History
The Evolution of Morphology
Andrew Carstairs-Mccarthy
Unlocking the Secrets of Prompt Engineering: Master the Art ...
Gilbert Mizrahi
Contemporary Debates in Philosophy of Science
Christopher Hitchcock
IGCSE Cambridge International Mathematics (0607) Extended
Keith Black Alison Ryan Michael Haese Robert Haese Sandra Haese ...
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
ASP.NET Core Security
Christian Wenz
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Advanced API Security: OAuth 2.0 and Beyond
Beginning Ethical Hacking With Python
Sanjib Sinha
Penetration Testing for Dummies
Robert Shimonski
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier