Beginning Quarkus Framework: Build Cloud-Native Enterprise Java ...
Tayo Koleoso
Computer Science and Technology and their Application
Mark I. Halpern & William C. Mcgee
Form and Being: Studies in Thomistic Metaphysics
Lawrence Dewan
Fuzzy Interval Matrices, Neutrosophic Interval Matrices and ...
W. B. Vasantha Kandasamy & Florentin Smarandache
Agent Sonya: Moscow's Most Daring Wartime Spy
Ben Macintyre
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Serious Python
Julien Danjou
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Forensics
Chet Hosmer
Crypto Dictionary
Jean-Philippe Aumasson
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Pearls of Discrete Mathematics
Martin Erickson
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang