Phenomenology and the Social Context of Psychiatry: Social Relations, ...
Magnus Englander
Discourse and Identity
Anna De Fina & Deborah Schiffrin & Michael Bamberg
Studies in Interactional Sociolinguistics (23)
Natural Language Processing and Chinese Computing: 8th CCF International ...
Dongyan Zhao & Jie Tang & Min-Yen Kan & Sujian Li & Hongying Zan
Philosophy for Everyone
Massimi, Michela & Chrisman, Matthew & Pritchard, Duncan & Fletcher, Guy & Mason, Elinor & Lavelle, Jane Suilin & Richmond, Alasdair & Ward, Dave
within You Is the Power
Joseph Murphy
The Joseph Murphy Library of Success Series (1)
Penetration Testing for Dummies
Robert Shimonski
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
The Private Production of Defense
Hans-Hermann Hoppe
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Kali Linux Penetration Testing Bible
Gus Khawaja
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Grokking Web Application Security
Malcolm McDonald
Data‑Centric Artificial Intelligence for Multidisciplinary Applications
Parikshit Narendra Mahalle & Namrata N. Wasatkar & Gitanjali Rahul Shinde
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer