The Big Picture: How to Use Data Visualization to Make Better ...
Steve Wexler
Huckleberry Finns Abenteuer und Fahrten
Mark Twain
Narcissism Book of Quotes
Sam Vaknin
The Politically Incorrect Guide to the Constitution
Kevin Gutzman
Rilke - Gesammelte Werke: 352 Werke auf 2000 Seiten - Das Marien-Leben, ...
Rainer Maria Rilke
Crypto Dictionary
Jean-Philippe Aumasson
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Linux Security Fundamentals
David Clinton
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Hacking for Dummies
Kevin Beaver
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Getting Started With OAuth 2.0
Ryan Boyd
Network Troubleshooting Tools
Joseph Sloan
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar