The Oxford Handbook of World Philosophy
Jay L. Garfield & William Edelglass
Chinese Computational Linguistics and Natural Language Processing ...
Yang Liu & Maosong Sun & Jun Zhao
Science Wars - What Scientists Know and How They Know It - Part ...
Steven L. Goldman
Modularity in Knowledge Representation and Natural-Language ...
Jay L. Garfield
Philosophy in the Islamic World: A History of Philosophy without ...
Peter Adamson
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
OpenStack in Action
Cody Bumgardner
Outlier Analysis
Charu C. Aggarwal
Pearls of Discrete Mathematics
Martin Erickson
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
The Private Production of Defense
Hans-Hermann Hoppe
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Production of Security, The
Gustave de Molinari
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Python Forensics
Chet Hosmer
Recent Advances in Security Privacy and Trust for Internet-Of-Things ...
Kuan-Ching Li