Wars of the Roses: A History From Beginning to End
Hourly History
Have a Conversation With Your Data
Andreas Blumauer
The Use of Force
Kelly M. Greenhill & Robert J. Art
The Encyclopedia of Eastern Philosophy and Religion: Buddhism, ...
Stephan Schuhmacher & Gert Worner
The Coup: 1953, the CIA, and the Roots of Modern U.S.-Iranian ...
Ervand Abrahamian
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
OpenStack in Action
Cody Bumgardner
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Python Forensics
Chet Hosmer
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Outlier Analysis
Charu C. Aggarwal
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Getting Started With OAuth 2.0
Ryan Boyd