Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, 2nd Edition
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls Author: Christopher J Hodson (Aut...
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls Author: Christopher J Hodson (Aut...
Computational Mathematics (Advances in Applied Mathematics) Author: Dimitrios Mitsotakis (Author) Edition 版本: 1st Publi...
Transforming Gender-Based Healthcare with AI and Machine Learning (Studies in Intelligent Systems and Cognitive Computin...
Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs Author: Maurício Harley (Author) ...
Python for Experimental Psychologists: A Fun Way of Learning How to Code Your Experiments and Analyses Author: Edwin S. ...
SPICE and LTspice for Power Electronics and Electric Power (Power Electronics and Applications Series) Author: Muhammad ...
Flutter Design Patterns and Best Practices: Build scalable, maintainable, and production-ready apps using effective arch...
Programming Big Data Applications: Scalable Tools and Frameworks for Your Needs Author: Domenico Talia (Author), Paolo T...
Regression and Machine Learning for Education Sciences Using R Author: Cody Dingsen (Author) Publisher finelybook 出版社: ...
Listed Volatility and Variance Derivatives: A Python-based Guide (Wiley Finance) Author: Yves Hilpisch (Author) Publishe...