Philosophy: Asking Questions--Seeking Answers
Stephen Stich & Tom Donaldson
Licensed to Lie: Exposing Corruption in the Department of Justice
Sidney Powell
Dumb and Dumber: How Cuomo and De Blasio Ruined New York
Matt Palumbo
Riemann Surfaces: With 27 Figures
Irwin Kra & Hershel M. Farkas
Gott als das offenbare Geheimnis nach Nikolaus von Kues
Martin Thurner
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Crypto Dictionary
Jean-Philippe Aumasson
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Hacking for Dummies
Kevin Beaver
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Getting Started With OAuth 2.0
Ryan Boyd
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Linux Security Fundamentals
David Clinton
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain