Haskell Quick Syntax Reference: A Pocket Guide to the Language, ...
Stefania Loredana Nita & Marius Mihailescu
Convex Functions and Their Applications: A Contemporary Approach
Constantin Niculescu & Lars-Erik Persson
Jungian Psychotherapy: A Study in Analytical Psychology
Michael Fordham
Graph Algorithms: Practical Examples in Apache Spark and Neo4j
Amy E. Hodler & Mark Needham
The Life of George Washington, Vol. 2 (of 5) Commander in Chief ...
John Marshall
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Beginning Ethical Hacking With Python
Sanjib Sinha
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Testing With Selenium
Sujay Raghavendra
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Docker Networking Cookbook
Jon Langemak
PowerShell and Python Together
Chet Hosmer
Python Passive Network Mapping
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Network Hacks - Intensivkurs
Bastian Ballmann