Arab Historians of the Crusades
Francesco Gabrieli
Learning JavaScript Design Patterns
Addy Osmani
Pathophysiology
Lee-Ellen C. Copstead & Jacquelyn L. Banasik
Cambridge International Dictionary of Phrasal Verbs
Elizabeth Walter
Fundamentals of Mathematical Analysis
Rod Haggarty
Cryptography for Internet and Database Applications
Nick Galbreath
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Pearls of Discrete Mathematics
Martin Erickson
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Serious Python
Julien Danjou
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Linux Security Fundamentals
David Clinton
Practical LPIC-1 Linux Certification Study Guide
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
OpenStack in Action
Cody Bumgardner
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell