The Oxford Handbook of Ethnicity, Crime, and Immigration
Sandra M. Bucerius & Michael H. Tonry
What It Looks Like: An Awakening Through Love and Trauma, War ...
Marta Maranda
Nixon's Gamble
Ray Locker
An Introduction to Computing with Fuzzy Sets
Witold Pedrycz
Intelligent Systems Reference Library (190)
Weapons of Mass Migration: Forced Displacement, Coercion, and ...
Kelly M. Greenhill
Beginning Ethical Hacking With Python
Sanjib Sinha
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Docker Networking Cookbook
Jon Langemak
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Network Hacks - Intensivkurs
Bastian Ballmann
PowerShell and Python Together
Chet Hosmer
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Passive Network Mapping
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Python Testing With Selenium
Sujay Raghavendra
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan