Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH),2nd Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) by: EC-Council Paperback...
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) by: EC-Council Paperback...
Develop Intelligent iOS Apps with Swift: Understand Texts,Classify Sentiments,and Autodetect Answers in Text Using NLP b...
Beginning Ruby: 3: From Beginner to Pro by: Carleton DiLeo and Peter CooperPaperback: 615 pages ISBN-10: 1484263235 ISBN...
Android Studio 4.1 Development Essentials - Java Edition: Developing Android 11 Apps Using Android Studio 4.1,Java and A...
SELinux System Administration: Implement mandatory access control to secure applications,users,and information flows on ...
Custom Fiori Applications in SAP HANA: Design,Develop,and Deploy Fiori Applications for the Enterprise by: Sergio Guerre...
AWS Penetration Testing: Implement various security strategies on AWS using tools such as Kali Linux,Metasploit,and Nmap...
Data Visualization in Society by: Helen Kennedy and Martin Engebretsen Paperback: 464 pages ISBN-10: 9463722904 ISBN-13:...

Machine Learning: A Probabilistic Perspective (Adaptive Computation and Machine Learning series) by: Kevin P. Murphy ISB...
Practical Ansible: Configuration Management from Start to Finish by: Vincent Sesto Paperback: 279 pages ISBN-10: 1484264...