The Prince and the Pauper
Mark Twain
AJAX: Grundlagen, Frameworks, APIs, 2. Auflage
Johannes Gamperl
2061: Odyssey Three
Arthur C. Clarke
Easy Meat: Inside the British Grooming Gang Scandal
Peter McLoughlin
Intermediate Tagalog: Developing Cultural Awareness Through ...
Teresita V. Ramos & Rosalina Morales Goulet
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Pearls of Discrete Mathematics
Martin Erickson
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Crypto Dictionary
Jean-Philippe Aumasson
Python Forensics
Chet Hosmer
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Serious Python
Julien Danjou
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Production of Security, The
Gustave de Molinari
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan