Quantification: Illustrations from the Creator of Secrets In ...
Scott Onstott
Anachronisms of Renaissance Postmodernism - On the Textuality ...
Christopher Kendrick
Physics with MAPLE: The Computer Algebra Resource for Mathematical ...
Frank Y. Wang
The Future of Post-Human Personality: A Preface to a New Theory ...
Peter Baofu
Strike for America: Chicago Teachers Against Austerity
Micah Uetricht
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Linux Security Fundamentals
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
OpenStack in Action
Cody Bumgardner
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
ASP.NET Core Security
Christian Wenz
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cryptography for Internet and Database Applications
Nick Galbreath
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Outlier Analysis
Charu C. Aggarwal
Hacking for Dummies
Kevin Beaver
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang