The Secret Army: The IRA
J. Bowyer Bell
Re-Creating the Corporation: A Design of Organizations for the ...
Russell Lincoln Ackoff
Fuzzy Set Theory — and Its Applications
Hans-Jürgen Zimmermann
Bilagebraic Structures and Smarandache Bialgebraic Structures ...
W. B. Vasantha Kandasamy
Mathematical Optimization and Economic Theory
Michael David Intriligator
Kali Linux Penetration Testing Bible
Gus Khawaja
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Grokking Web Application Security
Malcolm McDonald
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Penetration Testing for Dummies
Robert Shimonski
Network Troubleshooting Tools
Joseph Sloan
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley