Shadow Puppets
Orson Scott Card
Artificial Intelligence With Python
Teik Toe Teoh & Zheng Rong
Machine Learning: Foundations, Methodologies, and Applications (1)
Complete Works of Dante Alighieri (Delphi Classics)
Delphi Classics & Dante Alighieri
Delphi Poets Series (6)
25 Leadership Behaviors That Create a Culture of Continuous ...
KaiNexus
Simulating Copulas: Stochastic Models, Sampling Algorithms, ...
Jan-Frederik Mai & Matthias Scherer
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Crypto Dictionary
Jean-Philippe Aumasson
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Getting Started With OAuth 2.0
Ryan Boyd
Grokking Web Application Security
Malcolm McDonald
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Hacking for Dummies
Kevin Beaver
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Kali Linux Penetration Testing Bible
Gus Khawaja