The Eusebians: The Polemic of Athanasius of Alexandria and the ...
David M. Gwynn
Learning D3.Js Mapping
Thomas Newton & Oscar Villarreal
Integrated Natural Language Dialogue: A Computational Model
Robert E. Frederking
Functional Programming in R 4
Thomas Mailund
The Evolutionary Mind
Terence McKenna & Rupert Sheldrake & Ralph Abraham
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Network Hacks - Intensivkurs
Bastian Ballmann
Python Testing With Selenium
Sujay Raghavendra
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
PowerShell and Python Together
Chet Hosmer
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
Beginning Ethical Hacking With Python
Sanjib Sinha
Docker Networking Cookbook
Jon Langemak
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Python Passive Network Mapping
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson