Understanding History: An Introduction to Analytical Philosophy ...
Jonathan Gorman
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Said Hoceini & Scott Fowler & Boubaker Daachi
1,001 Tips for the Parents of Autistic Girls
Tony Lyons
Foundations of Mathematical Analysis
Richard Johnsonbaugh & W. E. Pfaffenberger
Peter Winchs "The Idea of a Social Science and its Relation ...
Ralph Wallenborn
Linux Security Fundamentals
David Clinton
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Penetration Testing for Dummies
Robert Shimonski
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann