LEP - the Lord of the Collider Rings at CERN 1980-2000: The ...
H. Schopper
Mathematical Tapas: Volume 2 (From Undergraduate to Graduate ...
Jean-Baptiste Hiriart-Urruty
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
On What Cannot Be Said: Apophatic Discourses in Philosophy, ...
William Franke
Band of Brothers
Stephen E. Ambrose
Kali Linux Penetration Testing Bible
Gus Khawaja
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Grokking Web Application Security
Malcolm McDonald
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Penetration Testing for Dummies
Robert Shimonski
Network Troubleshooting Tools
Joseph Sloan
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley