0 reads | |
8 reads | |
23 reads | |
Malware Data Science Malware Data Science: Attack Detection and Attribution
| 0 reads |
7 reads | |
Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
| 4 reads |
11 reads | |
2 reads | |
0 reads | |
OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
| 0 reads |
1 read | |
Dive Into Design Patterns Dive Into Design Patterns
| 5 reads |
1 read | |
2 reads | |
9 reads | |
A Brief Introduction to Machine Learning for Engineers A Brief Introduction to Machine Learning for Engineers
| 0 reads |
31 reads | |
0 reads | |
159 reads | |
0 reads | |
0 reads | |
Racket Programming the Fun Way Racket Programming the Fun Way: From Strings to Turing Machines
| 0 reads |
Undisturbed REST Undisturbed REST: a Guide to Designing the Perfect API
| 0 reads |
0 reads | |
The Web Application Hacker's Handbook The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
| 0 reads |
Official Google Cloud Certified Professional Data Engineer Study Guide Official Google Cloud Certified Professional Data Engineer Study Guide
| 0 reads |
0 reads | |
0 reads | |
Automate the Boring Stuff with Python, 2nd Edition Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
| 0 reads |
1 read | |
1 read | |
0 reads | |
1 read | |
1 read | |
1 read | |
0 reads | |
The Hardware Hacking Handbook The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
| 0 reads |
Robust Python Robust Python
| 0 reads |
0 reads | |
0 reads | |
0 reads | |
7 reads | |
1 read | |
1 read | |
70 reads | |
3 reads | |
0 reads | |
4 reads | |
0 reads | |
115 reads | |
464 reads | |
10 reads | |
1 read |