Soviet History in the Gorbachev Revolution
Robert William Davies
Beginning ReactJS Foundations Building User Interfaces With ...
Chris Minnick
Leading the Transformation: Applying Agile and DevOps Principles ...
Gary Gruver & Tommy Mouser
Encyclopedia of Animal Science
Wilson G. Pond & Alan W. Bell
The Dynamics of the Linguistic System: Usage, Conventionalization, ...
Hans-Jorg Schmid & Hans-Jörg Schmid
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
OpenStack in Action
Cody Bumgardner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Python Forensics
Chet Hosmer
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Outlier Analysis
Charu C. Aggarwal
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Getting Started With OAuth 2.0
Ryan Boyd