Trends in the Representation Theory of Finite Dimensional Algebras: ...
Edward L Greene & Edward L Green & Birge Huisgen-Zimmermann
Advanced Natural Language Processing with TensorFlow 2: Build ...
Ashish Bansal
Gurdjieff Reconsidered: The Life, the Teachings, the Legacy
Roger Lipsey
The Drunkard's Walk: How Randomness Rules Our Lives
Leonard Mlodinow
The Works of John Locke in 9 volumes, vol. 3 (1696)
John Locke
The Private Production of Defense
Hans-Hermann Hoppe
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Pearls of Discrete Mathematics
Martin Erickson
Outlier Analysis
Charu C. Aggarwal
OpenStack in Action
Cody Bumgardner
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Linux Security Fundamentals
Kali Linux Penetration Testing Bible
Gus Khawaja
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang