The Tao of Microservices
Richard Rodger
Jimi Hendrix: A Life From Beginning to End
Hourly History
In-Visibility: Reflections Upon Visibility and Transcendence ...
Anna Vind & Iben Damgaard & Kirsten Busch Nielsen & Sven Rune Havsteen & Christopher B. Brown & Günter Frank & Bruce Gordon & Barbara Mahlmann-Bauer & Tarald Rasmussen & Violet Soen & Zsombor Tóth & Günther Wassilowsky & Siegrid Westphal
Building IoT Visualizations Using Grafana: Power Up Your IoT ...
Rodrigo Juan Hernandez
Analysis of AC-Circuits
Test
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
PowerShell and Python Together
Chet Hosmer
Network Hacks - Intensivkurs
Bastian Ballmann
Beginning Ethical Hacking With Python
Sanjib Sinha
Python Testing With Selenium
Sujay Raghavendra
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Docker Networking Cookbook
Jon Langemak
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Passive Network Mapping
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield