Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
D3.Js by Example
Michael Heydt
Gaslighting, the Double Whammy, Interrogation and Other Methods ...
Theodore L. Dorpat
Pattern-Oriented Software Architecture, a Pattern Language for ...
Frank Buschmann & Kevlin Henney & Douglas C. Schmidt
The Second Amendment: A Biography
Michael Waldman
Corpus II: Writings on Sexuality
Jean-Luc Nancy
Contemporary Fiction and the Uses of Theory: The Novel From ...
Michael Greaney
The Beast and the Sovereign, Volume I
Jacques Derrida & Geoffrey Bennington
The Baudrillard Dictionary
Richard G. Smith
Antigone's Claim
Judith P. Butler