Statistics for Linguistics with R: A Practical Introduction
Stefan Th. Gries
Heidegger's Contributions to Philosophy: An Introduction
Daniela Vallega-Neu
Spring Data
Mark Pollack & Oliver Gierke & Thomas Risberg & Jon Brisbin & Michael Hunger
Textsorten in der Wirtschaft: Zwischen textlinguistischem Wissen ...
Wolfgang Kesselheim & Sascha Demarmels
Darkness by Design: The Hidden Power in Global Capital Markets
Walter Mattli
The Private Production of Defense
Hans-Hermann Hoppe
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Pearls of Discrete Mathematics
Martin Erickson
Outlier Analysis
Charu C. Aggarwal
OpenStack in Action
Cody Bumgardner
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Linux Security Fundamentals
Kali Linux Penetration Testing Bible
Gus Khawaja
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang