Philosophy and the Mirror of Nature: Thirtieth-Anniver[..] ...
Richard Rorty
Natural Language Processing – IJCNLP 2005: Second International ...
Robert Dale & Kam-Fai Wong & Oi Yee Kwong & Jian Su
Advances in Natural Language Processing, Intelligent Informatics ...
Thanaruk Theeramunkong & Rachada Kongkachandra & Thepchai Supnithi
Advances in Intelligent Systems and Computing (684)
The Works of John Locke in 9 volumes, vol. 2 (1689)
John Locke
Greek Tragedy and Political Philosophy: Rationalism and Religion ...
Peter J. Ahrensdorf
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Grokking Web Application Security
Malcolm McDonald
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Penetration Testing for Dummies
Robert Shimonski