Beyond Liberalism and Fundamentalism: How Modern and Postmodern ...
Nancey Murphy
Jung, Synchronicity, & Human Destiny: Noncausal Dimensions of ...
Ira Progoff
George Washington's War
Bruce Chadwick
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Occupying Political Science
E. Welty & M. Bolton & M. Nayak & C. Malone
Grokking Web Application Security
Malcolm McDonald
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
The Private Production of Defense
Hans-Hermann Hoppe
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Penetration Testing for Dummies
Robert Shimonski