Mathematical Methods for Physics and Engineering
Kenneth Franklin Riley & Michael Paul Hobson & Stephen John Bence
Cluster Analysis for Data Mining and System Identification
János Abonyi & Balázs Feil
Higher Wisdom: Eminent Elders Explore the Continuing Impact ...
Roger Walsh & Charles S. Grob
How Consciousness Became the Universe:: Quantum Physics, Cosmology, ...
Roger Penrose & Deepak Chopra & Henry P. Stapp & Brandon Carter & York H. Dobyns & Menas Kafatos & Michael B. Mensky & Gordon Globus & Subhash Kak & Stuart R. Hameroff
The Philosophy of William James: An Introduction
Richard M. Gale
Grokking Web Application Security
Malcolm McDonald
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
The Private Production of Defense
Hans-Hermann Hoppe
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Penetration Testing for Dummies
Robert Shimonski