The Enneagram - A Lecture by Georges Ivanovich Gurdjieff
Georges Ivanovich Gurdjieff
Cognitive Morphodynamics : Dynamical Morphological Models of ...
Jean Petitot
European Semiotics / Sémiotiques Européennes (11)
The Central Intelligence Agency: An Encyclopedia of Covert Ops, ...
Jan Goldman
Beyond the Flower of Life
Maureen J. St. Germain
Modalities of Thought - Language and Reality Pt. 1
Unknown
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Serious Python
Julien Danjou
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Beginning Ethical Hacking With Python
Sanjib Sinha
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
OpenStack in Action
Cody Bumgardner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain