Associative Networks: Representation and Use of Knowledge by ...
N. V. Findler
The Complete Infidel's Guide to the Koran
Robert Spencer
Encyclopedia of World Religions
Encyclopaedia Britannica, Inc.
Information Retrieval in Biomedicine: Natural Language Processing ...
Violaine Prince
Simulating Minds: The Philosophy, Psychology, and Neuroscience ...
Alvin I. Goldman
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Pearls of Discrete Mathematics
Martin Erickson
Outlier Analysis
Charu C. Aggarwal
OpenStack in Action
Cody Bumgardner
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Linux Security Fundamentals
David Clinton
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary