
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing) Author: Mic...
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing) Author: Mic...
Applied Machine Learning Using mlr3 in R Author: Bernd Bischl (Editor), Raphael Sonabend (Editor), Lars Kotthoff (Editor...
ASP.NET 8 Best Practices: Explore techniques, patterns, and practices to develop effective large-scale .NET web apps Aut...
Flame Game Development: Your Guide to Creating Cross-Platform Games in 2D Using Flame Engine in Flutter 3 Author: Andrés...
Android Studio Hedgehog Essentials – Java Edition 版本: Developing Android Apps Using Android Studio 2023.1.1 and J...
Python Debugging for AI, Machine Learning, and Cloud Computing: A Pattern-Oriented Approach Author: Dmitry Vostokov (Aut...
Mapping the Enterprise: Modeling the Enterprise as Services with Enterprise Canvas Author: Tom Graves (Author) Publisher...
The Architecture of Computer Hardware, Systems Software, and Networking: An Information Technology Approach Author: Irv ...
Ultimate VMware NSX for Professionals: Leverage Virtualized Networking, Security, and Advanced Services of VMware NSX fo...
UX for Business: How to Design Valuable Digital Companies Author: Joel Marsh (Author) Publisher finelybook 出版社: O’...