Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
A Study of History - Volume 12
Arnold J. Toynbee
Morphology by Itself: Stems and Inflectional Classes
Mark Aronoff
Hacker’s Guide to Machine Learning with Python
Venelin Valkov
Cisco - Glossary of Computer Technology
Cisco
Disordered Minds: How Dangerous Personalities Are Destroying ...
Ian Hughes