0 | |
4.2 | |
3.8 | |
Malware Data Science Malware Data Science: Attack Detection and Attribution
| 0 |
4 | |
Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
| 4.5 |
3.56 | |
4 | |
0 | |
OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
| 0 |
0 | |
Dive Into Design Patterns Dive Into Design Patterns
| 5 |
0 | |
4.5 | |
3.83 | |
A Brief Introduction to Machine Learning for Engineers A Brief Introduction to Machine Learning for Engineers
| 0 |
3.87 | |
0 | |
4.45 | |
0 | |
0 | |
Racket Programming the Fun Way Racket Programming the Fun Way: From Strings to Turing Machines
| 0 |
Undisturbed REST Undisturbed REST: a Guide to Designing the Perfect API
| 0 |
0 | |
The Web Application Hacker's Handbook The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
| 0 |
Official Google Cloud Certified Professional Data Engineer Study Guide Official Google Cloud Certified Professional Data Engineer Study Guide
| 0 |
0 | |
0 | |
Automate the Boring Stuff with Python, 2nd Edition Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
| 0 |
0 | |
0 | |
0 | |
5 | |
0 | |
0 | |
0 | |
The Hardware Hacking Handbook The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
| 0 |
Robust Python Robust Python
| 0 |
0 | |
0 | |
0 | |
4 | |
4 | |
0 | |
4.04 | |
3.33 | |
0 | |
4.17 | |
0 | |
4.31 | |
4.35 | |
4 | |
5 |