Interview with the Vampire
Anne Rice
Defining Darwin: Essays on the History and Philosophy of Evolutionary ...
Michael Ruse
Virtual Futures: Cyberotics, Technology and Posthuman Pragmatism
Joan Broadhurst Dixon & Eric J. Cassidy
Words Can Change Your Brain
Andrew B. Newberg
The Routledge Encyclopedia of Research Methods in Applied Linguistics
A. Mehdi Riazi
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Python Ethical Hacking From Scratch
Forensic Computing
A. J. Sammes & Brian Jenkinson
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Production of Security, The
Gustave de Molinari
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
Grokking Web Application Security
Malcolm McDonald