Inheritance, Defaults and the Lexicon
Ted Briscoe & Ann Copestake & Valeria de Paiva
Deep Learning for Natural Language Processing MEAP V07
Stephan Raaijmakers
A Connecticut Yankee in King Arthurs Court (Websters German ...
Mark Twain
The Information Governance Toolkit: Data Protection, Caldicott, ...
Tobias Keyser & Christine Dainty
Coding With AI for Dummies
Chris Minnick
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Serious Python
Julien Danjou
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Forensics
Chet Hosmer
Crypto Dictionary
Jean-Philippe Aumasson
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Pearls of Discrete Mathematics
Martin Erickson
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang