Economics in the Age of COVID-19
Joshua Gans
The Herald of Coming Good
Georges Ivanovich Gurdjieff
The Emperor Justinian and the Byzantine Empire
James Allen Evans
History of the Royal Society
Thomas Sprat
The Rules and Regulations for Mediating Myths & Magic
F. T. Lukens
The Rules (1)
Linux Security Fundamentals
David Clinton
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann