Leo Strauss on Political Philosophy: Responding to the Challenge ...
Leo Strauss
The Routledge Handbook of Research Methods in Applied Linguistics
Heath Rose & Jim McKinley
Gnosticism: New Light on the Ancient Tradition of Inner Knowing
Stephan A. Hoeller
Historical Dictionary of International Intelligence
Nigel West
Historical Dictionaries of Intelligence and Counterintelligence (1)
Affective Computing
Rosalind W. Picard
Cryptography for Internet and Database Applications
Nick Galbreath
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
ASP.NET Core Security
Christian Wenz
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
OpenStack in Action
Cody Bumgardner
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Linux Security Fundamentals
David Clinton
Practical LPIC-1 Linux Certification Study Guide
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Production of Security, The
Gustave de Molinari
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel