#203 | 0 | |
#204 | 4.2 | |
#205 | 3.8 | |
#206 | Malware Data Science Malware Data Science: Attack Detection and Attribution
| 0 |
#207 | 4 | |
#208 | Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
| 4.5 |
#209 | 3.56 | |
#210 | 4 | |
#211 | 0 | |
#212 | OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
| 0 |
#213 | 0 | |
#214 | Dive Into Design Patterns Dive Into Design Patterns
| 5 |
#215 | 0 | |
#216 | 4.5 | |
#217 | 3.83 | |
#218 | A Brief Introduction to Machine Learning for Engineers A Brief Introduction to Machine Learning for Engineers
| 0 |
#219 | 3.87 | |
#220 | 0 | |
#221 | 4.46 | |
#222 | 0 | |
#223 | 0 | |
#224 | Racket Programming the Fun Way Racket Programming the Fun Way: From Strings to Turing Machines
| 0 |
#225 | Undisturbed REST Undisturbed REST: a Guide to Designing the Perfect API
| 0 |
#226 | 0 | |
#227 | The Web Application Hacker's Handbook The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
| 0 |
#228 | Official Google Cloud Certified Professional Data Engineer Study Guide Official Google Cloud Certified Professional Data Engineer Study Guide
| 0 |
#229 | 0 | |
#230 | 0 | |
#231 | Automate the Boring Stuff with Python, 2nd Edition Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
| 0 |
#232 | 0 | |
#233 | 0 | |
#234 | 0 | |
#235 | 5 | |
#236 | 0 | |
#237 | 0 | |
#238 | 0 | |
#239 | The Hardware Hacking Handbook The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
| 0 |
#240 | Robust Python Robust Python
| 0 |
#241 | 0 | |
#242 | 0 | |
#243 | 0 | |
#244 | 4 | |
#245 | 4 | |
#246 | 0 | |
#247 | 4.04 | |
#248 | 3.33 | |
#249 | 0 | |
#250 | 4.17 | |
#251 | 0 | |
#252 | 4.31 | |
#253 | 4.35 | |
#254 | 4 | |
#255 | 5 |