Edexcel AS and A level Modular Mathematics - Core Mathematics ...
Harry Smith & Greg Attwood & Ian Bettison & Alan Clegg & Gill Dyer
Tricks to Simplify Your Digital Life
MakeUseOf
The Beauty Myth: How Images of Beauty Are Used Against Women
Naomi Wolf
Sourcebook on Criminal Law
Michael T. Molan
C.S. Lewis for the Third Millennium: Six Essays on the Abolition ...
Peter J. Kreeft
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Serious Python
Julien Danjou
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini