The Coptic Gnostic Library A Complete Edition of the Nag Hammadi ...
James McConkey Robinson
Die Agenda 2030 Als Magisches Vieleck Der Nachhaltigkeit
Estelle Herlyn & Magdalène Lévy-Tödter
FOM-Edition (1)
The Complete Idiot's Guide to the Power of the Enneagram
Herb Pearce, M. Ed.
PMP® Exam Prep: Accelerated Learning to Pass PMI's PMP® Exam ...
Rita Mulcahy
IoT: Building Arduino-Based Projects
Peter Waher & Pradeeka Seneviratne & Brian Russell & Drew van Duren
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Forensic Computing
A. J. Sammes & Brian Jenkinson
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Penetration Testing for Dummies
Robert Shimonski
Beginning Ethical Hacking With Python
Sanjib Sinha
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena