Data Structures & Algorithms in Python
John Canning & Alan Broder & Robert Lafore
Language, Music and Computing
Polina Eismont & Olga Mitrenina & Asya Pereltsvaig
Communications in Computer and Information Science (943)
Endless Empire: Spain's Retreat, Europe's Eclipse, America's ...
Alfred W. McCoy & Josep Maria Fradera & Stephen Jacobson (phd.)
Mathematica® Data Analysis
Sergiy Suchok
Hands-On Unsupervised Learning Using Python: How to Build Applied ...
Ankur A. Patel
Kali Linux Penetration Testing Bible
Gus Khawaja
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Grokking Web Application Security
Malcolm McDonald
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Penetration Testing for Dummies
Robert Shimonski
Network Troubleshooting Tools
Joseph Sloan
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley