The Lexham English Bible (Interlinear)
W. Hall Harris III
Indian Buddhist Philosophy
Amber Carpenter
Ancient Philosophies (1)
The Annotated Works of Henry George
Francis K. Peddle
Encyclopedia of Political Communication
Lynda Lee Kaid & Christina Holtz-Bacha
Papers of Nikola Tesla (EFOIA) - FBI Files - Set 2
Nikola Tesla
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Inside Java 2 Platform Security: Architecture, API Design, and ...
Li Gong & Gary Ellison & Mary Dageforde
Innovations in Computer Science and Engineering: Proceedings ...
H. S. Saini & Rishi Sayal & A. Govardhan & Rajkumar Buyya
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Grokking Web Application Security
Malcolm McDonald
Getting Started With OAuth 2.0
Ryan Boyd
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
Forensic Computing
A. J. Sammes & Brian Jenkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo