Eficacy and Vulnerability: Judith Butler on Reiteration and ...
Catherine Mills
The Science Delusion
Rupert Sheldrake
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
C.S. Lewis for the Third Millenium
Peter J. Kreeft
Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-Native ...
Jason Morgan & Flynn
The Book of Five Rings
Miyamoto Musashi