The Oxford Handbook of Contextual Political Analysis
Robert E. Goodin & Professor Of Philosophy & Social & Political Theory Robert E Goodin & Charles Tilly & Joseph L Buttenwieser Professor Of Social Science Charles Tilly
Ideals, Varieties, and Algorithms: An Introduction to Computational ...
David A. Cox & John Little & Donal O'Shea
Java 9 High Performance: Practical Techniques and Best Practices ...
Mayur Ramgir & Nick Samoylov
The Adventure of the Abbey Grange
Arthur Conan Doyle
The Return of Sherlock Holmes (12)
The Tycoons: How Andrew Carnegie, John D. Rockefeller, Jay Gould, ...
Charles R. Morris
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Linux Security Fundamentals
David Clinton
Penetration Testing for Dummies
Robert Shimonski
Getting Started With OAuth 2.0
Ryan Boyd
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan