Cicero's Philosophy of History
Matthew Fox & Senior Lecturer In Classics Matthew Fox
An Introduction to Copulas
Roger B. Nelsen
Learning Python Design Patterns Second Edition
Chetan Giridhar
ChatGPT Cheat Sheet for Business
datacamp
The Demon in the Freezer
Richard Preston
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Python Ethical Hacking From Scratch
Forensic Computing
A. J. Sammes & Brian Jenkinson
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Production of Security, The
Gustave de Molinari
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
Grokking Web Application Security
Malcolm McDonald