Neurology for the Speech-Language Pathologist
Wanda Webb & Richard K. Adler
DIY Boat Owner 2010.01 Spring
Unknown
Foundherentism in the Philosophy of Susan Haack
Joseph Abbah
Civil Rights: Rhetoric or Reality
Thomas Sowell
Successful Qualitative Research
Virginia Braun & Victoria Clarke
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Linux Security Fundamentals
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
OpenStack in Action
Cody Bumgardner
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
ASP.NET Core Security
Christian Wenz
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cryptography for Internet and Database Applications
Nick Galbreath
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Outlier Analysis
Charu C. Aggarwal
Hacking for Dummies
Kevin Beaver
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang