The Knights Templar on Trial: The Trial of the Templars in the ...
Helen J. Nicholson
Jungen. Eine Gebrauchsanweisung: Jungen verstehen und unterstützen
Reinhard Winter
Marx After Marxism: The Philosophy of Karl Marx
Tom Rockmore
RYA-MCA Coastal Skipper-Yachtmaster Offshore Shorebased 2008 ...
Unknown
Fuzzy Sets, Fuzzy Logic and Their Applications
Michael Gr. Voskoglou
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Serious Python
Julien Danjou
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini