#203 | 0 | 0 reads | ||
#204 | 4.2 | 8 reads | ||
#205 | 3.8 | 23 reads | ||
#206 | Malware Data Science Malware Data Science: Attack Detection and Attribution
| 0 | 0 reads | |
#207 | 4 | 7 reads | ||
#208 | Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
| 4.5 | 4 reads | |
#209 | 3.56 | 11 reads | ||
#210 | 4 | 2 reads | ||
#211 | 0 | 0 reads | ||
#212 | OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
| 0 | 0 reads | |
#213 | 0 | 1 read | ||
#214 | Dive Into Design Patterns Dive Into Design Patterns
| 5 | 5 reads | |
#215 | 0 | 1 read | ||
#216 | 4.5 | 2 reads | ||
#217 | 3.83 | 9 reads | ||
#218 | A Brief Introduction to Machine Learning for Engineers A Brief Introduction to Machine Learning for Engineers
| 0 | 0 reads | |
#219 | 3.87 | 31 reads | ||
#220 | 0 | 0 reads | ||
#221 | 4.45 | 158 reads | ||
#222 | 0 | 0 reads | ||
#223 | 0 | 0 reads | ||
#224 | Racket Programming the Fun Way Racket Programming the Fun Way: From Strings to Turing Machines
| 0 | 0 reads | |
#225 | Undisturbed REST Undisturbed REST: a Guide to Designing the Perfect API
| 0 | 0 reads | |
#226 | 0 | 0 reads | ||
#227 | The Web Application Hacker's Handbook The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
| 0 | 0 reads | |
#228 | Official Google Cloud Certified Professional Data Engineer Study Guide Official Google Cloud Certified Professional Data Engineer Study Guide
| 0 | 0 reads | |
#229 | 0 | 0 reads | ||
#230 | 0 | 0 reads | ||
#231 | Automate the Boring Stuff with Python, 2nd Edition Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
| 0 | 0 reads | |
#232 | 0 | 1 read | ||
#233 | 0 | 1 read | ||
#234 | 0 | 0 reads | ||
#235 | 5 | 1 read | ||
#236 | 0 | 1 read | ||
#237 | 0 | 1 read | ||
#238 | 0 | 0 reads | ||
#239 | The Hardware Hacking Handbook The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
| 0 | 0 reads | |
#240 | Robust Python Robust Python
| 0 | 0 reads | |
#241 | 0 | 0 reads | ||
#242 | 0 | 0 reads | ||
#243 | 0 | 0 reads | ||
#244 | 4 | 7 reads | ||
#245 | 4 | 1 read | ||
#246 | 0 | 1 read | ||
#247 | 4.04 | 70 reads | ||
#248 | 3.33 | 3 reads | ||
#249 | 0 | 0 reads | ||
#250 | 4.17 | 4 reads | ||
#251 | 0 | 0 reads | ||
#252 | 4.31 | 115 reads | ||
#253 | 4.35 | 464 reads | ||
#254 | 4 | 10 reads | ||
#255 | 5 | 1 read |