Hear the Ancient Wisdom: A Meditational Reader for the Whole ...
Charles R. Ringma
Philosophy of Space & Time, Part III
Peter Machamer & John Earman & Merrilee H. Salmon & James G. Lennox & John D. Norton & Clark Glymour & J. E. McGuire & Wesley C. Salmon & Kenneth F . Schaffner
The Great Sioux War: A History from Beginning to End (Native ...
Hourly History
Dictionary of the Khazars - Androgynous Edition
Milorad Pavić
Jesuit Science and the End of Nature's Secrets
Mark A. Waddell
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Kali Linux Penetration Testing Bible
Gus Khawaja
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
ASP.NET Core Security
Christian Wenz
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard