Georg Iwanowitsch Gurdjieff - Magier, Mystiker, Menschenfänger
James Moore
Yahoo! Hacks
Paul Bausch
Philosophy of Paradox in the Fifteenth Century: Nicolaus Cusanus’ ...
Eugen Russo
Encyclopedia of Astrobiology
Muriel Gargaud & William M. Irvine & Ricardo Amils & José Cernicharo Quintanilla & Henderson James Cleaves & Daniele Pinti & Daniel Rouan & Tilman Spohn & Stéphane Tirard & Michel Viso
Encyclopedia of World Cultures North America
David Levinson
Serious Python
Julien Danjou
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Penetration Testing for Dummies
Robert Shimonski
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Linux Security Fundamentals
David Clinton
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar