Census and Identity: The Politics of Race, Ethnicity, and Language ...
David I. Kertzer & Dominique Arel
Encyclopedic Dictionary of Mathematics
Mathematical Society Of Japan & Nihon SÅ«gakkai
A Companion to the Classical Greek World
Konrad H. Kinzl
NLP Who's who
Richard Bandler & Robert Dilts & John Grinder & Leslie Cameron-Bandler & David Gordon
East and West in the Early Middle Ages: The Merovingian Kingdoms ...
Yaniv Fox & Stefan Esders & Yitzhak Hen & Laury Sarti
Penetration Testing for Dummies
Robert Shimonski
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Kali Linux Penetration Testing Bible
Gus Khawaja
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Grokking Web Application Security
Malcolm McDonald
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Network Troubleshooting Tools
Joseph Sloan
Getting Started With OAuth 2.0
Ryan Boyd
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann