Guyton and Hall Textbook of Medical Physiology
John E. Hall
Fusion: An Anthology
J. C. Andrijeski & Shannon Mayer & Denise Grover Swank & Addison Moore & Eve Langlais & Shelly Crane & Stephanie Erickson & Amy Bartol
In Retreat: America's Withdrawal From the Middle East
Russell Berman
Introduction to Disciplined Agile Delivery 2nd Edition: A Small ...
Mark Lines & Scott Ambler
The Multiple Ligament Injured Knee: A Practical Guide to Management
Gregory C. Fanelli
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Getting Started With OAuth 2.0
Ryan Boyd
Linux Security Fundamentals
David Clinton
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills