Lectures on Infinite Dimensional Lie Algebras
Alexander Kleshchev
Carl Schmitt's Critique of Liberalism: Against Politics as Technology
John P. McCormick
Against the Flow
John Carson Lennox
The Queen of Sheba and Her Only Son Menyelek: Aka the Kebra ...
Sir Ernest Alfred Wallis Budge
The Quran and the Secular Mind: A Philosophy of Islam
Shabbir Akhtar
The Private Production of Defense
Hans-Hermann Hoppe
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Pearls of Discrete Mathematics
Martin Erickson
Outlier Analysis
Charu C. Aggarwal
OpenStack in Action
Cody Bumgardner
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Linux Security Fundamentals
Kali Linux Penetration Testing Bible
Gus Khawaja
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang