Context and Culture in Language Teaching and Learning
Michael Byram & Peter Grundy
5 Practical React Projects
Sitepoint
Derived categories and their applications - Essay
MarĂa Julia Redondo & Andrea Solotar
The Byzantine Theocracy
Steven Runciman
Israel's Exodus in Transdisciplinary Perspective
Thomas E. Levy & Thomas Schneider & William H. C. Propp
Quantitative Methods in the Humanities and Social Sciences (1)
Linux Security Fundamentals
David Clinton
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann