#203 | |
#204 | |
#205 | |
#206 | Malware Data Science Malware Data Science: Attack Detection and Attribution
|
#207 | |
#208 | Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
|
#209 | |
#210 | |
#211 | |
#212 | OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
|
#213 | |
#214 | Dive Into Design Patterns Dive Into Design Patterns
|
#215 | |
#216 | |
#217 | |
#218 | A Brief Introduction to Machine Learning for Engineers A Brief Introduction to Machine Learning for Engineers
|
#219 | |
#220 | |
#221 | |
#222 | |
#223 | |
#224 | Racket Programming the Fun Way Racket Programming the Fun Way: From Strings to Turing Machines
|
#225 | Undisturbed REST Undisturbed REST: a Guide to Designing the Perfect API
|
#226 | |
#227 | The Web Application Hacker's Handbook The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
|
#228 | Official Google Cloud Certified Professional Data Engineer Study Guide Official Google Cloud Certified Professional Data Engineer Study Guide
|
#229 | |
#230 | |
#231 | Automate the Boring Stuff with Python, 2nd Edition Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
|
#232 | |
#233 | |
#234 | |
#235 | |
#236 | |
#237 | |
#238 | |
#239 | The Hardware Hacking Handbook The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
|
#240 | Robust Python Robust Python
|
#241 | |
#242 | |
#243 | |
#244 | |
#245 | |
#246 | |
#247 | |
#248 | |
#249 | |
#250 | |
#251 | |
#252 | |
#253 | |
#254 | |
#255 |