The Charmed Circle of Ideology: A Critique of Laclau and Mouffe, ...
Geoff Boucher
The Water Is Wide
Pat Conroy
Pearson Edexcel International a Level: Pure Mathematics 2 - ...
Greg Attwood
Radical Enactivism : Intentionality, Phenomenology and Narrative ...
Edited by Richard Menary
A Contextual Behavioral Guide to the Self: Theory and Practice
Ian Stewart & Louise McHugh & Priscilla Almada
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Pearls of Discrete Mathematics
Martin Erickson
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Crypto Dictionary
Jean-Philippe Aumasson
Python Forensics
Chet Hosmer
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Serious Python
Julien Danjou
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Production of Security, The
Gustave de Molinari
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan