Wittgenstein on Rules and Private Language: An Elementary Exposition
Saul A. Kripke
The Publisher: Henry Luce and His American Century
Alan Brinkley
On the Meaning of Prepositions and Cases: The Expression of ...
Silvia Luraghi
Ich fühle, also bin ich: die Entschlüsselung des Bewusstseins
Antonio R. Damasio
Religion, Metaphysics, and the Postmodern: William Desmond and ...
Christopher Ben Simpson
Outlier Analysis
Charu C. Aggarwal
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Crypto Dictionary
Jean-Philippe Aumasson
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Hacking for Dummies
Kevin Beaver
Getting Started With OAuth 2.0
Ryan Boyd
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
OpenStack in Action
Cody Bumgardner
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary