A Study of History - Abridged
Arnold Joseph Toynbee & D. C. Somervell
Thought and Language
John Preston
Star Wars and Philosophy: More Powerful Than You Can Possibly ...
Kevin S. Decker
Webster's Dictionary and Thesaurus
Merriam-Webster, Inc
Symbols of Transformation: An Analysis of the Prelude to a Case ...
Carl Gustav Jung
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Production of Security, The
Gustave de Molinari
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Python Forensics
Chet Hosmer
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Serious Python
Julien Danjou
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky