The Dictionary of Demons: Expanded & Revised
Michelle Belanger
PowerShell 7 Workshop: Learn How to Program With PowerShell ...
Nick Parlow
Das Vermächtnis Unserer Nahrung
Sally Fallon & Mary G. Enig
Delphi Complete Works of Mary Wollstonecraft (Illustrated)
Delphi Classics & Mary Wollstonecraft
Delphi Series Seven (9)
Beginning Ethical Hacking With Python
Sanjib Sinha
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Linux Security Fundamentals
David Clinton
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods