Content Distribution Networks: An Engineering Approach
Dinesh C. Verma
Gordon Ramsay's Ultimate Cookery Course
Gordon Ramsay
Digitalisierung in Der Praxis
Axel Uhl & Stephan Loretan
Knative Cookbook: Building Effective Serverless Applications ...
Burr Sutter & Kamesh Sampath
Market-Oriented Grid and Utility Computing
Rajkumar Buyya & Kris Bubendorfer
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
OpenStack in Action
Cody Bumgardner
Outlier Analysis
Charu C. Aggarwal
Pearls of Discrete Mathematics
Martin Erickson
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
The Private Production of Defense
Hans-Hermann Hoppe
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Production of Security, The
Gustave de Molinari
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Python Forensics
Chet Hosmer
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li