The Encyclopedia of Crystals, Herbs, and New Age Elements: An ...
Adams Media
Learning and Soft Computing: Support Vector Machines, Neural ...
Vojislav Kecman
Deixis and Pronouns in Romance Languages
Kirsten Jeppesen Kragh & Jan Lindschouw
Penthouse Legend
Ayn Rand
Elements of Mathematics: From Euclid to Gödel
John Stillwell
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
OpenStack in Action
Cody Bumgardner
Outlier Analysis
Charu C. Aggarwal
Pearls of Discrete Mathematics
Martin Erickson
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
The Private Production of Defense
Hans-Hermann Hoppe
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Production of Security, The
Gustave de Molinari
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Python Forensics
Chet Hosmer
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li