
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources 1st ed. Edition Author: Mor...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources 1st ed. Edition Author: Mor...
Linux for Small Business Owners: Using Free and Open Source Software to Power Your Dreams Author: David Both and Cyndi B...
Java EE to Jakarta EE 10 Recipes: A Problem-Solution Approach for Enterprise Java Author: Josh Juneau and Tarun Telang P...
Hands-on AIOps: Best Practices Guide to Implementing AIOps Author: Navin Sabharwal and Gaurav Bhardwaj Publisher finelyb...
Machine Learning on Geographical Data Using Python: Introduction into Geodata with Applications and Use Cases Author: Jo...
Computer Vision Projects with PyTorch: Design and Develop Production-Grade Models July 19 2022 Author: Akshay Kulkarni,A...
Getting Started with Ethereum: A Step-Author: -Step Guide to Becoming a Blockchain Developer Author: Davi Pedro Bauer Pu...
Software Development Activity Cycles: Collaborative Development, Continuous Testing and User Acceptance Author: Robert F...
Generic Data Structures and Algorithms in Go: An Applied Approach Using Concurrency, Genericity and Heuristics Author: R...
Artificial Intelligence in Medical Sciences and Psychology: With Application of Machine Language, Computer Vision, and N...