John Adams: A Life From Beginning to End (Biographies of US ...
Hourly History
Mobile Computing
Henry F. Korth & Tomasz Imielinski
Encyclopedia of Applied Ethics
Peter Singer & Dan Callahan
The Princeton Companion to Mathematics
Timothy Gowers
The Body Quantum: The New Physics of Body, Mind and Health
Fred Alan Wolf
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Pearls of Discrete Mathematics
Martin Erickson
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Crypto Dictionary
Jean-Philippe Aumasson
Python Forensics
Chet Hosmer
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Serious Python
Julien Danjou
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Production of Security, The
Gustave de Molinari
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan