Theosophy: History of a Pseudo-Religion
René Guénon
Corpus Linguistics in Literary Analysis Jane Austen and her ...
Unknown
Contemporary Linguistics: An Introduction
John Archibald & William O'Grady & Francis Katamba
An Introduction to English Morphology: Words and Their Structure
Andrew Carstairs-Mccarthy
Adventures in the Screen Trade
William Goldman
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Cryptography for Internet and Database Applications
Nick Galbreath
Crypto Dictionary
Jean-Philippe Aumasson
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Beginning Ethical Hacking With Python
Sanjib Sinha
ASP.NET Core Security
Christian Wenz
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod