Logic and Information
Neville Dean
Leadership Skills
Aneeka Patel
Vedic Mathematics, 'Vedic' or 'Mathematics': A Fuzzy & Neutrosophic ...
W. B. Vasantha Kandasamy & Florentin Smarandache
Compute!'s Mapping the IBM PC and PCjr
Russ Davies
The Corpus Hermeticum (Royal Collector's Edition) (Case Laminate ...
Hermes Trismegistus
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Linux Security Fundamentals
David Clinton
Kali Linux Penetration Testing Bible
Gus Khawaja
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Grokking Web Application Security
Malcolm McDonald
Getting Started With OAuth 2.0
Ryan Boyd