The Holocaust and the Nakba: A New Grammar of Trauma and History
Bashir Bashir & Amos Goldberg
Forty Reasons I Am a Catholic
Peter J. Kreeft
Die Macht Ihres Unterbewußtseins
Murphy, Dr. Joseph
The Kubernetes Book - 2017
Nigel Poulton
The Reign of Relativity: Philosophy in Physics 1915-1925
Thomas Ryckman
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Linux Security Fundamentals
David Clinton
Kali Linux Penetration Testing Bible
Gus Khawaja
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Grokking Web Application Security
Malcolm McDonald
Getting Started With OAuth 2.0
Ryan Boyd