Academic Legal Writing: Law Review Articles, Student Notes, ...
Eugene Volokh
British Propaganda and News Media in the Cold War
John Jenks
The Search for Mathematical Roots, 1870-1940: Logics, Set Theories ...
I. Grattan-Guinness
Secrets of the Thoth Tarot VOL III The Sanctuary of Transcendental ...
Marcus Katz
Sacred Geometry and Numerology
Moustafa Gadalla
Learn Bash the Hard Way
Ian Miell
Knowledge Is Beautiful
David McCandless
Isomorphic Application Development With JavaScript
Konstantin Tarkus
GPU-based Parallel Implementation of Swarm Intelligence Algorithms
Ying Tan
GPU Computing Gems Emerald Edition
Wen-Mei Hwu
GPU Computing Gems Jade Edition
Fast Python for Data Science MEAP V08
Tiago Rodrigues Antão
Ethical Reasoning in Big Data: An Exploratory Analysis
Jeff Collmann & Sorin Adam Matei
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Data Sketches: A Journey of Imagination, Exploration, and Beautiful ...
Nadieh Bremer & Shirley Wu
Data Munging With Perl
David Cross
Computer Programming: 4 Books in 1: Data Science, Hacking With ...
Jason Callaway
Cassandra: The Definitive Guide - DataStax version, 3rd Edition
Eben Hewitt & Jeff Carpenter
Seeing, Thinking and Knowing: Meaning and Self-Organisation ...
Arturo Carsetti
Beginning Ethical Hacking With Python
Sanjib Sinha
Pro SharePoint 2013 Branding and Responsive Web Development
Oscar Medina & Kanwal Khipple & Rita Zhang & Eric Overfield & Chris Beckett & Benjamin Niaulin
HTML5 Game Programming With Enchant.js
Ryohei Fushimi & Hidekazu Furukawa & Brandon McInnis & Ryo Tanaka & Kevin Kratzer
Active Directory With PowerShell
Sitaram Pamarthi
Network Troubleshooting Tools
Joseph Sloan