The Elephant and the Mouse: Moving Beyond the Illusion of Inclusion ...
Laura A. Liswood
Encyclopaedia of Mathematics: Volume 6: Subject Index — Author ...
Michiel Hazewinkel
Natural Language Processing and Chinese Computing: Second CCF ...
Juanzi Li & Dongyan Zhao & Yansong Feng & Guodong Zhou
Encyclopedia of Contemporary Chinese Culture
Edward Lawrence Davis
Adorno and Derrida as Readers of Husserl; Some Reflections on ...
Sabine Wilke
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Serious Python
Julien Danjou
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini