Computer Music Instruments II: Realtime and Object-Oriented ...
Victor Lazzarini
Why We Talk: The Evolutionary Origins of Language
Jean-Louis Dessalles
Encyclopedia of the Ancient Greek World
David Sacks & Oswyn Murray & Lisa R. Brody
Monster of God: The Man-Eating Predator in the Jungles of History ...
David Quammen
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Crypto Dictionary
Jean-Philippe Aumasson
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Getting Started With OAuth 2.0
Ryan Boyd
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Hacking for Dummies
Kevin Beaver
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Linux Security Fundamentals
David Clinton
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang