A First Course in Abstract Algebra: Rings, Groups, and Fields, ...
Marlow Anderson & Todd Feil
Bad Science: Quacks, Hacks, and Big Pharma Flacks (older version)
Ben Goldacre
Silent Spring
Rachel Carson
Functional Structure in Morphology and the Case of Nonfinite ...
Peter Nielsen
Linux Security Fundamentals
David Clinton
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
ASP.NET Core Security
Christian Wenz
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang