Precarious Life: The Powers of Mourning and Violence
Judith P. Butler & Maxine Elliot
An Introduction to Mathematica - Tutorial
P. Ramsden & P. Kent
Full Stack GraphQL Applications: With React, Node.js, and Neo4j
William Lyon
International Encyclopedia of the Social Sciences
William A. Darity
Frodo’s Journey
Joseph Pearce
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Python Ethical Hacking From Scratch
Forensic Computing
A. J. Sammes & Brian Jenkinson
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Production of Security, The
Gustave de Molinari
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
Grokking Web Application Security
Malcolm McDonald
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Dark Territory: The Secret History of Cyber War
Fred Kaplan