Somatoform and Factitious Disorders
Katharine A. Phillips
Approaches and Methods in Language Teaching
Jack Croft Richards & Theodore S. Rodgers
Introducing the AQAL Framework
Kenneth E. Wilber
Songs of Innocence
William Blake & Geraldine Ill Morris
New Directions in Philosophy and Literature
David Rudrum & Ridvan Askin & Frida Beckman
Grokking Web Application Security
Malcolm McDonald
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
The Private Production of Defense
Hans-Hermann Hoppe
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Penetration Testing for Dummies
Robert Shimonski