An Open Letter to Bill Bennett
Milton Friedman
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
Designing and Conducting Mixed Methods Research
John W. Creswell & Vicki L. Plano Clark
After Charlie Hebdo: Terror, Racism and Free Speech
Gavan Titley & Des Freedman & Gholam Khiabany & Aurélien Mondon
Edexcel AS and A level Further Mathematics Further Statistics ...
Harry Smith & Greg Attwood & Ian Bettison & Alan Clegg & Gill Dyer
Handbook of Discrete and Combinatorial Mathematics, Second Edition
Kenneth H. Rosen
Natural Language Processing - NLP 2000: Second International ...
Dimitris N. Christodoulakis
Pearls of Discrete Mathematics
Martin Erickson
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
Python Distilled
David Beazley
Learn Penetration Testing with Python 3.x: Perform Offensive ...
Yehia Elghaly
Information Visualization: Beyond the Horizon
Chaomei Chen
Introduction to Information Visualization
Riccardo Mazza
Data Cleaning: Pocket Primer
Oswald Campesato
Applications of Combinatorial Matrix Theory to Laplacian Matrices ...
Jason J. Molitierno
Learning Modern Linux: A Handbook for the Cloud Native Practitioner
Michael Hausenblas
Continuous Delivery With Docker and Jenkins
Rafal Leszko
Docker Networking Cookbook
Jon Langemak
Docker in Action
Jeff Nickoloff & Stephen Kuenzli
GNU Emacs Pocket Reference
Debra Cameron
Getting Started With Kubernetes - Second Edition
Jonathan Baier
Hands-On Enterprise Automation on Linux
James Freeman
Kubernetes Management Design Patterns
Deepak Vohra
Learning Debian GNU/Linux
Bill McCarty
Kubernetes Security and Observability
Brendan Creane & Amit Gupta