Descartes Natural Philosophy by S. Gaukroger, John Schuster, ...
Unknown
Theory of Knowledge
Roderick M. Chisholm
The Oxford Handbook of the State in the Ancient Near East and ...
Peter Fibiger Bang & Walter Scheidel
Charles Dickens a to Z: The Essential Reference to His Life ...
Paul Davis
The Philosophy of Mysticism: Perennialism and Constructivism ...
Randolph T. Dible II
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Network Troubleshooting Tools
Joseph Sloan
Penetration Testing for Dummies
Robert Shimonski
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Grokking Web Application Security
Malcolm McDonald
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Kali Linux Penetration Testing Bible
Gus Khawaja
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney