A Blake Dictionary: The Ideas and Symbols of William Blake
S. Foster Damon
The Oxford Handbook of Contemporary Phenomenology
Dan Zahavi
Europe 1789 to 1914: Encyclopedia of the Age of Industry and ...
John M. Merriman & J. M. Winter
Oxford International Maths for Cambridge Secondary 1 Student ...
Deborah Barton
Deep Reinforcement Learning with Python
Nimish Sanghi
Penetration Testing for Dummies
Robert Shimonski
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
The Private Production of Defense
Hans-Hermann Hoppe
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Kali Linux Penetration Testing Bible
Gus Khawaja
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Grokking Web Application Security
Malcolm McDonald
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer