Ernest Hemingway: A Life From Beginning to End (Biographies ...
Hourly History
Dictionary of Psychology and Allied Sciences
M. S. Bhatia
Dictionary of Polynesian Mythology
Robert D. Craig
Eighteenth Brumaire of Louis Bonaparte
Karl Marx
Legendary Britain: An Illustrated Journey
John Matthews & Bob Stewart & R. J. Stewart
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Python Forensics
Chet Hosmer
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
CORS in Action: Creating and Consuming Cross-Origin APIs
Monsur Hossain
Wired/Wireless Internet Communications: 12th International Conference, ...
Abdelhamid Mellouk & Scott Fowler & Boubaker Daachi & Said Hoceini
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, ...
Fei Hu
OpenStack in Action
Cody Bumgardner
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Subjective Logic: A Formalism for Reasoning Under Uncertainty
Audun Jøsang
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Beginning Ethical Hacking With Python
Sanjib Sinha
Advanced API Security: The Definitive Guide to API Security
Prabath Siriwardena
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
Designing for Privacy and Its Legal Framework: Data Protection ...
Aurelia Tamò-Larrieux