48 Hours
William R. Forstchen
Philosophy of Art
Noël Carroll
Routledge Contemporary Introductions to Philosophy (1)
3D Game Development with Unity
Franz Lanzinger
Knowledge in Medieval Philosophy
Henrik Lagerlund
Essays on Extinction: Death of the Posthuman
Claire Colebrook
Network Troubleshooting Tools
Joseph Sloan
Cryptography for Internet and Database Applications
Nick Galbreath
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Forensic Computing
A. J. Sammes & Brian Jenkinson
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The Private Production of Defense
Hans-Hermann Hoppe
Production of Security, The
Gustave de Molinari
Pearls of Discrete Mathematics
Martin Erickson
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Getting Started With OAuth 2.0
Ryan Boyd
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Outlier Analysis
Charu C. Aggarwal
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino