Corpus-Based Contrastive Studies of English and Chinese
Tony McEnery & Richard Xiao
DE-HUMAN: Essays on the DeGrowth, DeCarbon and DeCrypto War ...
Joe Doran
The War for Natural Humanity (2)
The Dialects of British English in Fictional Texts
Michael Mayer
Routledge Research in Language and Communication (1)
Continuous Delivery With Docker and Jenkins
Rafal Leszko
A Tutorial on the Expectation-Maxim[..] Algorithm Including ...
Detlef Prescher
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
PowerShell and Python Together
Chet Hosmer
Network Hacks - Intensivkurs
Bastian Ballmann
Beginning Ethical Hacking With Python
Sanjib Sinha
Python Testing With Selenium
Sujay Raghavendra
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Docker Networking Cookbook
Jon Langemak
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Python Passive Network Mapping
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield