10 Steps Every CISO Should Take to Secure Next-Gen Software
Cindy Blake
Caring for Body and Soul: Burial and the Afterlife in the Merovingian ...
Bonnie Effros
Agent-Centered Morality: An Aristotelian Alternative to Kantian ...
George W. Harris
Teaching Children the Bible: New Models in Christian Education
Marion Pardy
Between the Woods and the Water
Patrick Leigh Fermor
Simple Secrets to Becoming a Saving Whiz: Stop Feeling Overwhelmed, ...
Gina Zakaria
Learning Concurrency in Python
Elliot Forbes
Learning Typescript
Remo H. Jansen
Learning TypeScript
Josh Goldberg
Learning HTML5 Game Programming: A Hands-On Guide to Building ...
James Lamar Williams
Learn Git The Hard Way
Ian Miell
Learn Bash the Hard Way
Knowledge Is Beautiful
David McCandless
Isomorphic Application Development With JavaScript
Konstantin Tarkus
Isomorphic Web Applications: Universal Development with React
Elyse Kolker Gordon
GPU-based Parallel Implementation of Swarm Intelligence Algorithms
Ying Tan
GPU Computing Gems Emerald Edition
Wen-Mei Hwu
GPU Computing Gems Jade Edition
Fast Python for Data Science MEAP V08
Tiago Rodrigues Antão
Ethical Reasoning in Big Data: An Exploratory Analysis
Jeff Collmann & Sorin Adam Matei
Python Ethical Hacking From Scratch: Think Like an Ethical Hacker, ...
Fahad Ali Sarwar
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Data Sketches: A Journey of Imagination, Exploration, and Beautiful ...
Nadieh Bremer & Shirley Wu
Data Munging With Perl
David Cross
Computer Programming: 4 Books in 1: Data Science, Hacking With ...
Jason Callaway