The Harmonious Circle
James Webb
A Project to Find the Fundamental Theory of Physics
Stephen Wolfram
Ein neues Ich: Wie Sie Ihre gewohnte Persönlichkeit in vier ...
Joe Dispenza
Assistive Technology and Artificial Intelligence: Applications ...
Vibhu O. Mittal & Holly A. Yanco & John Aronis & Richard C. Simpson
XGBoost with Python: Gradient Boosted Trees with XGBoost and ...
Jason Brownlee
Cryptography for Internet and Database Applications
Nick Galbreath
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
ASP.NET Core Security
Christian Wenz
Data Science and Big Data Analytics: ACM-WIR 2018
Durgesh Kumar Mishra & Xin-She Yang & Aynur Unal
OpenStack in Action
Cody Bumgardner
Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
The Red Web The Struggle Between Russia's Digital Dictators ...
Andrei Soldatov & Irina Borogan
Linux Security Fundamentals
David Clinton
Practical LPIC-1 Linux Certification Study Guide
Exploring Security in Software Architecture and Design
Felderer, Michael & Scandariato, Riccardo
Microservices Security in Action
Prabath Siriwardena & Nuwan Dias
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Information Retrieval and Natural Language Processing: A Graph ...
Sheetal S. Sonawane & Parikshit N. Mahalle & Archana S. Ghotkar
Wi-Foo
Andrew A. Vladimirov & Konstantin V. Gavrilenko & Andrei A. Mikhailovsky
Dark Territory: The Secret History of Cyber War
Fred Kaplan
Data and Goliath: The Hidden Battles to Collect Your Data and ...
Bruce Schneier
Production of Security, The
Gustave de Molinari
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel