Violent Python - A Cookbook for Hackers, Forensic Analysts, ...
TJ O'Conner
Mobile and Wireless Network Security and Privacy
Unknown
Beginning Python Games Development, Second Edition: With PyGame
Harrison Kinsley & Will McGugan
RASHID Power Electronics Handbook
Java - The Complete Reference (9th Edition)
Herbert Schildt
Java™: A Beginner’s Guide: Sixth Edition
Linux Cookbook
Carla Schroder
Python for Software Design
How to Think Like a Computer Scientist (2009)
The Lady of the Lake
Walter Scott
untitled
Linux Shell Scripting & Bash (2004)
Michael
Mastering UNIX Shell Scripting (Wiley, 2003)
Beginning Python Visualization
Crafting Visual Transformation Scripts (2009)
Gray Hat Python
Justin Seitz
Java 3D Programming
Daniel Selman
The Complete Works of William Shakespeare
William Shakespeare
Romeo and Juliet
Hamlet, Prince of Denmark
Shakespeare's play of the Merchant of Venice / Arranged for ...
Design Patterns Explained
James R. Trott (Ripped by mOdELeR) Alan Shalloway
Frankenstein; Or, The Modern Prometheus
Mary Wollstonecraft Shelley
Learn Python In a Weekend, Python for Beginners.
Chris Sheridan
Introduction to Botany
Alexey Shipunov
Sierra K., Bates B. - OCA OCP Java SE 7 Programmer I & II Study ...
Kathy Sierra & Bert Bates
Operating System Concepts
Peter Baer Galvin and Greg Gagne Abraham Silberschatz
Hacking Windows XPExtremeTech
Steve. Sinchak
The Code Book - HOW TO MAKE IT, BREAK IT, HACK IT, CRACK IT
Simon Singh
Beginning Ethical Hacking with Python
Sanjib Sinha
SEW Step by Step
Alison Smith
How to Succeed as an Inventor / Showing the Wonderful Possibilities ...
Goodwin Brooke Smith
Plant Tissue Culture - Fourth Edition - Techniques And Experiments ...
Roberta H Smith
DevOps Bootcamp
Mitesh Soni
Sew Many Bags. Sew Little Time
Sally Southern
Pyom- Optimization Modeling in Python (2n Edition)
Springer
A Guide to Computer Network Security
Plant Propagation by Tissue Culture - 3rd Edition
A Concise And Practical Introduction To Programming Algorithms ...
Minter_685-4FRONT.fm
Susan Stevens
The Strange Case of Dr. Jekyll and Mr. Hyde
Robert Louis Stevenson
CISSP ® : Certified Information Systems Security Professional ...
James Michael Stewart & Ed Tittel & Mike Chapple
The Art of Hand Sewing Leather
Al Stohlman
Dracula
Bram Stoker
Guide to Supervisory Control and Data Acquisition (SCADA) and ...
stouffer
Programming Principles and Practice Using C++
Bjarne Stroustrup
The C++ Programming Language
The C++ Programming Language (Special 3rd Edition)
Functional Programming in Java
Venkat Subramaniam
Peer To Peer Computing: The Evolution Of A Disruptive Technology
Brian D. Goodman Ramesh Subramanian
PHP, MySQL, JavaScript & HTML5 All-In-One For Dummies
Janet Valade Steven Suehring
Programming in Python 3: A Complete Introduction to the Python ...
Mark Summerfield
Invent Your Own Computer Games with Python
Al Sweigart
Automate the Boring Stuff with Python
Gulliver's Travels into Several Remote Regions of the World
Jonathan Swift
20 Fantastic Kali Llinux Tools
SwordSec
Swt/Jface in Action
T
GPU parallel computing for machine learning in Python: how to ...
Yoshiyasu Takefuji
Python Power!: The Comprehensive Guide
Matt Telles
MACHINE LEARNING WITH PYTHON: Learn the art of Programming with ...
Jason Test
Information Security Management Handbook, Fifth Edition
Micki Krause Harold F. Tipton
War and Peace
graf Leo Tolstoy
The Science of Plants
Tom Michaels, Saint Paul, MN Emily Hoover, Saint Paul, MN Laura ...
Electronic Circuits: Fundamentals and Applications, Third Edition
Michael Tooley
Introduction to Artificial Intelligence
Marc Toussaint
The Elements of Statistical Learning - Data Mining, Interference, ...
Trevor Hastie, Robert Tibshirani, Jerome Freidman