Stonehenge and Other British Stone Monuments Astronomically ...
Joseph Norman Lockyer & Diana Luppi
How Things Work Encyclopedia
Carrie Love & Penny Smith & Margaret Parrish
The Chronicles of Narnia and Philosophy: The Lion, the Witch, ...
William Irwin & Jerry L. Walls & Gregory Bassham
The Convoluted Universe - Book Five
Dolores Cannon
Beyond Snobbery Grammar Need not be Cruel to be Cool
June Casagrande
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Kali Linux Penetration Testing Bible
Gus Khawaja
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
ASP.NET Core Security
Christian Wenz
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard