The Sky: Mystery, Magic, and Myth
Jean-Pierre Verdet
Pirates: The Golden Age of Piracy: A History From Beginning ...
Hourly History
Triangulating Methodological Approaches in Corpus Linguistic ...
Jesse Egbert & Paul Baker
Higher Wisdom: Eminent Elders Explore the Continuing Impact ...
Roger Walsh & Charles S. Grob
The Cambridge Companion to Victorian Poetry
Joseph Bristow & Professor Of English Joseph Bristow
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena
Advanced API Security: The Definitive Guide to API Security
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
ASP.NET Core Security
Christian Wenz
Beginning Ethical Hacking With Python
Sanjib Sinha
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Crypto Dictionary
Jean-Philippe Aumasson
Cryptography for Internet and Database Applications
Nick Galbreath
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner