Thomas Kuhn's "Linguistic Turn" and the Legacy of Logical Empiricism: ...
Stefano Gattei
The Power of Legitimacy Among Nations
Thomas M. Franck
Style in Translation: A Corpus-Based Perspective
Libo Huang
kierkegaard and postmodernism - Essay
J. Blake Huggins
Knowledge Representation with Ontologies: The Present and Future
Christopher Brewster & Kieron O’Hara
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
ASP.NET Core Security
Christian Wenz
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Advanced API Security: OAuth 2.0 and Beyond
Beginning Ethical Hacking With Python
Sanjib Sinha
Penetration Testing for Dummies
Robert Shimonski
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier