Voyages With John: Charting the Fourth Gospel
Robert Kysar
Secrets of the Aether Unified Force Theory, Dark Matter and ...
David W. Thomson III & Jim D. Bourassa & Jon Lomberg
Selecta Mathematica - Volume 2
Karl Menger
Analysis mit Mathematica® und Maple: Repetitorium und Aufgaben ...
Walter Strampp
Recent Results in Infinite Dimensional Analysis and Applications ...
Werner Westerkamp
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Hacking for Dummies
Kevin Beaver
Outlier Analysis
Charu C. Aggarwal
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Cryptography for Internet and Database Applications
Nick Galbreath
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
ASP.NET Core Security
Christian Wenz
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
OpenStack in Action
Cody Bumgardner
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Linux Security Fundamentals
David Clinton
Practical LPIC-1 Linux Certification Study Guide
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel