What China and India Once Were: The Pasts That May Shape the ...
Sheldon Pollock & Benjamin Elman
Before European Hegemony: The World System A.D. 1250-1350
Janet L. Abu-Lughod
Anticipations of the Reaction of Mechanical and Scientific Progress ...
H. G. Wells
Philosophy of the Unconscious
Eduard von Hartmann
Frobenius Splitting Methods in Geometry and Representation Theory
Shrawan Kumar & Michel Brion & Joseph Oesterlé
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Security, Privacy and Trust in Cloud Systems
Surya Nepal & Mukaddim Pathan
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Python Passive Network Mapping
Chet Hosmer
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Docker Networking Cookbook
Jon Langemak
Beginning Ethical Hacking With Python
Sanjib Sinha
Internet of Things Security and Data Protection
Sébastien Ziegler
Internet of Things (1)
PowerShell and Python Together
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Python Programming Illustrated For Beginners & Intermediates: ...
William Sullivan
The Future Is Here! (1)
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Python Testing With Selenium
Sujay Raghavendra
Network Hacks - Intensivkurs
Bastian Ballmann
Python Ethical Hacking From Scratch
Fahad Ali Sarwar
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang