The Sociology of Zygmunt Bauman: Challenges and Critique
Michael Hviid Jacobsen & Poul Poder
Schaum's Outline of Mathematica®, 2ed
Eugene Don
Schaum's Outline Series (1)
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Modern Legal Drafting: A Guide to using Clearer Language
Peter Butt & Richard Castle
Complex Analysis - The Hitchhiker's Guide to the Plane 2nd Edition
David Orme Tall & Ian Nicholas Stewart
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Pearls of Discrete Mathematics
Martin Erickson
Production of Security, The
Gustave de Molinari
The Private Production of Defense
Hans-Hermann Hoppe
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Forensic Computing
A. J. Sammes & Brian Jenkinson
Webster's New World Hacker Dictionary
Bernadette Hlubik Schell & Clemens Martin
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Cryptography for Internet and Database Applications
Nick Galbreath
Network Troubleshooting Tools
Joseph Sloan