Beginning Ethical Hacking With Python
Sanjib Sinha
Banned Money Secrets (Banned Secrets Book 3)
Dotts, Richard
Boundaries of Morphology and Syntax
Lunella Mereu
React Native in Action
Nader Dabit
Telling Flesh: The Substance of the Corporeal
Vicki Kirby
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Linux Security Fundamentals
David Clinton
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Penetration Testing for Dummies
Robert Shimonski
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Advanced API Security: OAuth 2.0 and Beyond
Prabath Siriwardena
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Serious Python
Julien Danjou
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Advanced API Security: The Definitive Guide to API Security