Assessing Speaking
Sari Luoma
Mathematics, Physics & Chemistry with the Wolfram Language
S. M. Blinder
The Ultimate Data and AI Guide: 150FAQs About Artificial Intelligence, ...
Michael Gramlich & Alexander Thamm & Dr. Alexander Borek
The Lost Prophet: The Book of Enoch and Its Influence on Christianity
Margaret Barker
Agile Processes in Software Engineering and Extreme Programming
Michael Rosemann & Juan Garbajosa & Xiaofeng Wang & Ademar Aguiar & John Mylopoulos & Michael J. Shaw & Clemens Szyperski & Wil M. P. van der Aalst
Network Troubleshooting Tools
Joseph Sloan
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Getting Started With OAuth 2.0
Ryan Boyd
Penetration Testing for Dummies
Robert Shimonski
Linux Security Fundamentals
David Clinton
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Digital Forensic Investigation of Internet of Things (IoT) Devices
Reza Montasari & Hamid Jahankhani & Richard Hill & Simon Parkinson
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Crypto Dictionary
Jean-Philippe Aumasson
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Kali Linux Penetration Testing Bible
Gus Khawaja
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Hacking for Dummies
Kevin Beaver