Edmund Husserl: Philosophy and the Crisis of European Man - ...
Edmund Husserl
Conservation Biology for All
Paul R. Ehrlich & Navjot S. Sodhi
Modern and Postmodern Crises of Symbolic Structures: Essays ...
Peter Šajda
30-Second Astronomy: The 50 Most Mindblowing Discoveries in ...
François Fressin
Engagement and transcendence: the militant philosophy of Alain ...
Nick Hewlett
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Kali Linux Penetration Testing Bible
Gus Khawaja
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
ASP.NET Core Security
Christian Wenz
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard