Introduction to Natural Language Processing
Mary Dee Harris
Cognitive Linguistics: Internal Dynamics and Interdisciplinary ...
Francisco José Ruiz de Mendoza Ibáñez
Linux in Action
David Clinton
Data Envelopment Analysis: Theory, Methodology, and Applications
Abraham Charnes & William W. Cooper & Arie Y. Lewin & Lawrence M. Seiford
Cambridge Igcse Mathematics Core and Extended 4th Edition
Ric Pimental & Terry Wall
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Pearls of Discrete Mathematics
Martin Erickson
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Crypto Dictionary
Jean-Philippe Aumasson
Python Forensics
Chet Hosmer
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Serious Python
Julien Danjou
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Production of Security, The
Gustave de Molinari
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan