The Evolution of Morphology
Andrew Carstairs-Mccarthy
Origin of Freemasonry: 1717 Theory
Chalmers I. Paton
Karl Popper's Philosophy of Science: Rationality without Foundations
Stefano Gattei
Wall Street's Think Tank: The Council on Foreign Relations and ...
Laurence H. Shoup
Making Sense of War: Strategy for the 21st Century
Alan Stephens
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Proceedings of the Sixth International Conference on Mathematics ...
Debasis Giri & Rajkumar Buyya & S. Ponnusamy & Debashis de & Andrew Adamatzky & Jemal H. Abawajy
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Penetration Testing for Dummies
Robert Shimonski
Nmap Network Scanning: Official Nmap Project Guide to Network ...
Gordon Lyon
Network Troubleshooting Tools
Joseph Sloan
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Linux Security Fundamentals
David Clinton
Kali Linux Penetration Testing Bible
Gus Khawaja
Intelligent and Cloud Computing: Proceedings of ICICC 2019, ...
Debahuti Mishra & Rajkumar Buyya & Prasant Mohapatra & Srikanta Patnaik
Hacking for Dummies
Kevin Beaver
Hacking APIs: Breaking Web Application Programming Interfaces ...
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces
Grokking Web Application Security
Malcolm McDonald
Getting Started With OAuth 2.0
Ryan Boyd