A Grammar of Old English, Volume 2: Morphology
R. D. Fulk & Richard Hogg
Hundert Jahre „Gemeinschaft und Gesellschaft“: Ferdinand Tönnies ...
Lars Clausen & Carsten Schlüter
Natural Language Processing and Chinese Computing: 4th CCF Conference, ...
Juanzi Li & Heng Ji & Dongyan Zhao & Yansong Feng
A Textbook of Theosophy
Charles Webster Leadbeater
Python Machine Learning. A Crash Course for Beginners to Understand ...
Josh Hugh
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Grokking Web Application Security
Malcolm McDonald
Getting Started With OAuth 2.0
Ryan Boyd
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Forensic Computing
A. J. Sammes & Brian Jenkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo