Thrice Greatest Hermes: Studies in Hellenistic Theosophy and ...
Hermes Trismegistus & G. R. S. Mead
In Defense of "Extreme Apriorism" - Essay
Murray Newton Rothbard
The Innovator's Dilemma: When New Technologies Cause Great Firms ...
Clayton M. Christensen
Hitler's Art Thief
Susan Ronald
Embodied Hope
Kelly M. Kapic
Stand-Alone (1)
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Advanced Platform Development With Kubernetes
Craig Johnston
Edge AI
Xiaofei Wang & Yiwen Han & Victor C. M. Leung & Dusit Niyato & Xueqiang Yan & Xu Chen
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Virtual, Augmented and Mixed Reality: Design and Development
Jessie Y. C. Chen & Gino Fragomeni
Lecture Notes in Computer Science (13317)
Understanding Network Hacks
Bastian Ballmann
PowerShell and Python Together
Chet Hosmer
Mastering Python Scripting for System Administrators
Ganesh Sanjiv Naik
Network Hacks - Intensivkurs
Complex Network Analysis in Python
Dmitry Zinoviev
Beginning Ethical Hacking With Python
Sanjib Sinha
Deep Learning Mit Python Und Keras
François Chollet
Python Testing With Selenium
Sujay Raghavendra
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Hands-On Enterprise Automation on Linux
James Freeman
Docker Networking Cookbook
Jon Langemak
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Learn Penetration Testing with Python 3.x: Perform Offensive ...
Yehia Elghaly