Malware Data Science Malware Data Science: Attack Detection and Attribution
|
Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
|
OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
|
Dive Into Design Patterns Dive Into Design Patterns
|
A Brief Introduction to Machine Learning for Engineers A Brief Introduction to Machine Learning for Engineers
|
Racket Programming the Fun Way Racket Programming the Fun Way: From Strings to Turing Machines
|
Undisturbed REST Undisturbed REST: a Guide to Designing the Perfect API
|
The Web Application Hacker's Handbook The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
|
Official Google Cloud Certified Professional Data Engineer Study Guide Official Google Cloud Certified Professional Data Engineer Study Guide
|
Automate the Boring Stuff with Python, 2nd Edition Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
|
The Hardware Hacking Handbook The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
|
Robust Python Robust Python
|