Mastering OpenCV 4 With Python: A Practical Guide Covering Topics ...
Alberto Fernández Villán
A Dictionary of First Names
Patrick Hanks & Flavia Hodges & Kate Hardcastle
Circle View
Brad Barkley
Pilgrims
Garrison Keillor
Learning AngularJS: A Guide to AngularJS Development
Ken Williamson
The Business of iOS App Development: For iPhone, iPad and iPod ...
Dave Wooldridge & Taylor Pierce
Pro Express.js: Master Express.js: The Node.js Framework for ...
Azat Mardan
Protecting Oracle Database 12c
Paul Wright
Windows PowerShell Desired State Configuration Revealed
Ravikanth Chaganti
Pro Python System Administration
Rytis Sileika
Effective Modern C++: 42 Specific Ways to Improve Your Use of ...
Scott Meyers
JavaScript for Kids
Nick Morgan
Running Mainframe Z on Distributed Platforms: How to Create ...
Kenneth Barrett & Stephen Norris
Financial Modeling for Business Owners and Entrepreneurs: Developing ...
Tom Y. Sawyer
@War: The Rise of the Military-Internet Complex
Shane Harris
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Ada's Algorithm: How Lord Byron's Daughter Ada Lovelace Launched ...
James Essinger
The End of Absence: Reclaiming What We've Lost in a World of ...
Michael Harris
Geek Sublime: The Beauty of Code, the Code of Beauty
Vikram Chandra
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Escape Velocity: Cyberculture at the End of the Century
Mark Dery
Learning Nagios 4
Wojciech Kocjan
Alfresco CMIS
Martin Bergljung
Learn SQL Server Administration in a Month of Lunches: Covers ...
Don Jones
Mastering Sublime Text
Dan Peleg
Solr in Action
Trey Grainger & Timothy Potter
BeagleBone Home Automation
Juha Lumme
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Windows 8.1 Bible
Jim Boyce & Jeffrey R. Shapiro & Rob Tidrow
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Getting Started With Intel Galileo
Matt Richardson
MySQL High Availability: Tools for Building Robust Data Centers
Charles Bell & Mats Kindahl & Lars Thalmann
What Just Happened: A Chronicle From the Information Frontier
James Gleick
Web Design All-In-One for Dummies
Sue Jenkins
Access 2013 All-In-One for Dummies
Alison Barrows & Joseph C. Stockman & Allen G. Taylor
Releasing HTML5 Games for Windows 8
Jesse Freeman
Windows Phone 7 Programming for Android and iOS Developers
Zhinan Zhou & Robert Zhu & Pei Zheng & Baijian Yang
PostgreSQL Replication
Zoltan Boszormenyi & Hans-Jürgen Schönig
Linux Utilities Cookbook
James Kent Lewis
Practical Raspberry Pi
Brendan Horan
Beginning Sensor Networks With Arduino and Raspberry Pi
Charles Bell
Beginning C for Arduino: Learn C Programming for the Arduino
Jack Purdum
Programming Arduino Next Steps: Going Further With Sketches
Simon Monk
War Play: Video Games and the Future of Armed Conflict
Corey Mead
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
When Computers Were Human
David Alan Grier
It Began With Babbage: The Genesis of Computer Science
Subrata Dasgupta
Python For Informatics: Exploring Information
Charles Severance
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
The New Digital Age
Jared Cohen & Eric Schmidt
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Security Consulting
Charles A. Sennewald
Quantum Computing Since Democritus
Scott Aaronson
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Federated Identity Primer
Derrick Rountree
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Brett Shavers