F**k: An Irreverent History of the F-Word
Rufus Lodge
Constructional Morphology and Evolution
Norbert Schmidt-Kittler & Klaus Vogel
Love Letters: The Romantic Secrets Hidden in Our Handwriting
Paula Roberts
Eye to Eye: The Quest for the New Paradigm
Kenneth E. Wilber
Harry Potter: The Complete Collection (1-7)
J. K. Rowling & Olly Moss
Harry Potter (1)
The Private Production of Defense
Hans-Hermann Hoppe
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Pearls of Discrete Mathematics
Martin Erickson
Outlier Analysis
Charu C. Aggarwal
OpenStack in Action
Cody Bumgardner
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Mastering Python Forensics
Dr. Michael Spreitzenbarth & Dr. Johann Uhrmann
Lloyd's MIU Handbook of Maritime Security
Rupert Herbert-Burns & Sam Bateman & Peter Lehr
Linux Security Fundamentals
Kali Linux Penetration Testing Bible
Gus Khawaja
IT-Sicherheit mit System: Integratives IT-Sicherheits-, Kontinuitäts- ...
Klaus-Rainer Müller
Internet and Distributed Computing Systems: 6th International ...
Mukaddim Pathan & Guiyi Wei & Giancarlo Fortino
Internet and Distributed Computing Systems: 5th International ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang