Hypatia A Journal of Feminist Philosophy, Vol. 3, No. 2
J. Trebilcot & L. Heldke & U. Narayan & L. M. Purdy & E. F. Kittay & G. Stenstad & J. Allen & C. Card & M. Friedman & B. M. Landesman & L. T. Duchamp
On the Road to Bolshevization
Communist International
Language in Literature: Style and Foregrounding
Geoffrey N. Leech
Crystal Reports XI: The Complete Reference
George Peck
Osborne Complete Reference Series (1)
Tiny CSS Projects
Martine Dowden & Michael Gearon
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Python Passive Network Mapping
Chet Hosmer
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Docker Networking Cookbook
Jon Langemak
Beginning Ethical Hacking With Python
Sanjib Sinha
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
PowerShell and Python Together
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Python Testing With Selenium
Sujay Raghavendra
Network Hacks - Intensivkurs
Bastian Ballmann
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang