The Evolution of Morphology
Andrew Carstairs-Mccarthy
Projects in Linguistics - A Practial Guide to Researching Language
Alison Wray & Aileen Bloomer & Kate Trott & Shirley Reay & Chris Butler
Prince of Thieves
Chuck Hogan
Raum und Zeit
Roger Penrose & Stephen W. Hawking
Wolves In Sheep's Clothing
Charlotte Thompson Iserbyt
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Getting Started With OAuth 2.0
Ryan Boyd
Advanced API Security: The Definitive Guide to API Security
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Network Troubleshooting Tools
Joseph Sloan
Beginning Ethical Hacking With Python
Sanjib Sinha
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde