
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH),2nd Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) by: EC-Council Print Len...
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) by: EC-Council Print Len...
Develop Intelligent iOS Apps with Swift: Understand Texts,Classify Sentiments,and Autodetect Answers in Text Using NLP b...
Beginning Ruby: 3: From Beginner to Pro by: Carleton DiLeo and Peter CooperPrint Length 页数: 615 pages ISBN-10: 148426323...
Android Studio 4.1 Development Essentials – Java Edition 版本: Developing Android 11 Apps Using Android Studio 4.1,...
SELinux System Administration: Implement mandatory access control to secure applications,users,and information flows on ...
Custom Fiori Applications in SAP HANA: Design,Develop,and Deploy Fiori Applications for the Enterprise by: Sergio Guerre...
AWS Penetration Testing: Implement various security strategies on AWS using tools such as Kali Linux,Metasploit,and Nmap...
Data Visualization in Society by: Helen Kennedy and Martin Engebretsen Print Length 页数: 464 pages ISBN-10: 9463722904 IS...
Machine Learning: A Probabilistic Perspective (Adaptive Computation and Machine Learning series) by: Kevin P. Murphy ISB...
Practical Ansible: Configuration Management from Start to Finish by: Vincent Sesto Print Length 页数: 279 pages ISBN-10: 1...