Army GI, Pacifist CO: The World War II Letters of Frank and ...
Frank Dietrich & Albert Dietrich
Dictionary of Sexual Dreams
Martha Clarke
Continuous Integration and Delivery With Test-Driven Development: ...
Amit Bhanushali & Alekhya Achanta & Beena Bhanushali
Hacking With Kali: Practical Penetration Testing Techniques
Andrew Bindner & James Broad
Invitation to Complex Analysis
Ralph P. Boas & Harold P. Boas
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Serious Python
Julien Danjou
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini