Keynes and Macroeconomics After 70 Years: Critical Assessments ...
L. Randall Wray & Mathew Forstater
jQuery Recipes: A Problem-Solution Approach
Bintu M. Harwani
Code: The Hidden Language of Computer Hardware and Software
Charles Petzold
Three Philosophical Poets
George Santayana
Better Presentations: A Guide for Scholars, Researchers, and ...
Jonathan Schwabish
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Pearls of Discrete Mathematics
Martin Erickson
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Crypto Dictionary
Jean-Philippe Aumasson
Python Forensics
Chet Hosmer
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Serious Python
Julien Danjou
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Production of Security, The
Gustave de Molinari
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan