The Mueller Report: The Final Report of the Special Counsel ...
Alan Dershowitz & Robert S. Mueller & Special Counsel's Office U. S. Department Of Justice
GPU Computing Gems Emerald Edition
Wen-Mei Hwu
Jazz Guitar Licks: 25 Licks From the Major Scale & Its Modes
Gareth Evans
Application of Graph Rewriting to Natural Language Processing
Guillaume Bonfante & Bruno Guillaume & Guy Perrier
Tragedy and Hope: A History of the World in Our Time
Carroll Quigley
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Network Troubleshooting Tools
Joseph Sloan
Penetration Testing for Dummies
Robert Shimonski
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Grokking Web Application Security
Malcolm McDonald
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Kali Linux Penetration Testing Bible
Gus Khawaja
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney