Ideen Zu Einer Reinen Phänomenologie Und Phänomenologischen ...
Huss
A Study of History - Abridged
Arnold Joseph Toynbee & D. C. Somervell
War in a Time of Peace: Bush, Clinton, and the Generals
David Halberstam
Weaver
Stephen Baxter
Interkulturelle Medienkommunikation: Eine Einführung
Hans-Dieter Kübler
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Linux Security Fundamentals
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Advances in Security, Networks, and Internet of Things: Proceedings ...
Kevin Daimi & Hamid R. Arabnia & Leonidas Deligiannidis & Min-Shiang Hwang & Fernando G. Tinetti
Serious Python
Julien Danjou
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Pearls of Discrete Mathematics
Martin Erickson
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
Cryptography for Internet and Database Applications
Nick Galbreath
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Advanced Criminal Investigations and Intelligence Operations: ...
Robert J. Girod
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr