10 Steps Every CISO Should Take to Secure Next-Gen Software
Cindy Blake
The Present Personal: Philosophy and the Hidden Face of Language
Hagi Kenaan
Programming With TensorFlow: Solution for Edge Computing Applications
Kolla Bhanu Prakash & G. R. Kanagachidambaresan
Silenced in the Library
Zeke Jarvis
Astrophysics Through Computation: with Mathematica® Support
Brian Koberlein & David Meisel
State of Fear
Michael Crichton