Cybersecurity Ops With Bash: Attack, Defend, and Analyze From ...
Carl Albing & Paul Troncone
Leadership by the Number: Using the Enneagram to Strengthen ...
Jon Singletary
Language and Automata Theory and Applications: 4th International ...
Carlos Martin-Vide & Adrian Horia Dediu & Henning Fernau
Migration in the 2030 Agenda
United Nations
Performance Excellence - Der Praxisleitfaden zum effektiven ...
Karl Werner Wagner & Gerold Patzak
Easy Programming for the ZX Spectrum
Ian Nicholas Stewart & Robin Jones
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Data Streams: Models and Algorithms
Charu C. Aggarwal
Data and Knowledge Engineering: Third International Conference, ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Current Trends in Database Technology - EDBT 2004 Workshops: ...
Wolfgang Lindner & Marco Mesiti & Can Türker & Yannis Tzitzikas & Athena Vakali
Lecture Notes in Computer Science (3268)
Content-Centric Networks: An Overview, Applications and Research ...
Syed Hassan Ahmed & Safdar Hussain Bouk & Dongkyun Kim
Content Computing: Advanced Workshop on Content Computing, AWCC ...
Chi-Hung Chi & Kwok-Yan Lam
Connectivity and Edge Computing in IoT: Customized Designs and ...
Jie Gao & Mushu Li & Weihua Zhuang
Cloud as a Service: Understanding the Service Innovation Ecosystem
Enrique Castro-Leon & Robert Harmon
Build Your Own IoT Platform: Develop a Fully Flexible and Scalable ...
Anand Tamboli
Android Game Recipes: A Problem-Solution Approach
Jerome Dimarzio
Advanced Platform Development With Kubernetes
Craig Johnston