The Innate Mind: Structure and Contents
Peter Carruthers & Stephen Stich & Stephen Laurence
On Purposeful Systems: An Interdisciplinary Analysis of Individual ...
Russell Lincoln Ackoff & Frederick Edmund Emery & Brent D. Ruben
Ship Captain's Medical Guide
Unknown
The Country and the City
Raymond Williams
A Practical Guide to ‘Free-Energy’ Devices
Patrick J. Kelly
Linux Security Fundamentals
David Clinton
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann