For the Love of Language: An Introduction to Linguistics
Kate Burridge & Tonya N. Stebbins
Studies in Linguistic Variation and Change 3: Corpus-Driven ...
Sylvain Gatelais & Ileana Sasu & Fabienne Toupin
Against Moral Responsibility
Bruce N. Waller
Mathematical Models in Philosophy of Science - Paper
S. J. Rey
Parallel Computing
G. R. Joubert & Gerhard Joubert & Almerica Murli & Frans Peters & Almerico Murli & F. J. Peters & M. Vanneschi
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
ASP.NET Core Security
Christian Wenz
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Advanced API Security: OAuth 2.0 and Beyond
Beginning Ethical Hacking With Python
Sanjib Sinha
Penetration Testing for Dummies
Robert Shimonski
Cloud Native Software Security Handbook: Unleash the Power of ...
Mihir. Shah
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier