Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Mathematical Analysis for Machine Learning and Data Mining
Dan A. Simovici
VMware Virtual SAN Cookbook
Jeffrey Taylor
Apache Spark 2.x Cookbook
Rishi Yadav
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Crypto101
Laurens Van Houtven
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
What Is Computer Science?: An Information Security Perspective
Daniel Page & Nigel Smart
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL ...
Ivan Ristic
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
Cryptography and Network Security: Principles and Practice (6th ...
Cryptography in C and C++
Michael Welschenbach
Computational Number Theory and Modern Cryptography
Song Y. Yan