Survey of Text Mining: Clustering, Classification, and Retrieval
Michael W. Berry
The Subjection of Women - The Foundations of Liberal Feminism
John Stuart Mill & Susan Hekman
Kentauron Dual Language Easy Reader (1)
Medieval Philosophy: A History of Philosophy without Any Gaps
Peter Adamson
The Dead Sea Scrolls Bible: The Oldest Known Bible Translated ...
Eugene Ulrich & Martin G. Abegg, Jr. & Peter Flint
Interkulturelle Zusammenarbeit: Kulturen — Organisationen — ...
Geert Hofstede
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Kali Linux Penetration Testing Bible
Gus Khawaja
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
ASP.NET Core Security
Christian Wenz
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard