
Attacking Network Protocols: A Hacker’s Guide to Capture,Analysis,and Exploitation
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Author:James Forshaw (Author) ASIN:...

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Author:James Forshaw (Author) ASIN:...

AI Agents and Applications: With LangChain, LangGraph, and MCP Author:Roberto Infante (Author) Publisher finelybook 出版社:...

AI, Cybersecurity and Data Science for Drone and Unmanned Aerial Vehicles Author:Shishir Kumar Shandilya (Author), Ferna...

Ultimate Certified Kubernetes Security Specialist (CKS) Certification Guide: Secure Kubernetes Clusters, Harden Applicat...

Data Modeling with Snowflake: A practical guide to accelerating Snowflake development using universal modeling technique...

Technological Applications for Smart Sensors: Intelligent Applications for Real-Time Strategies Author:S. Kannadhasan (A...

Metacognitive Artificial Intelligence Author:Paulo Shakarian (Author), Hua Wei (Author) Publisher finelybook 出版社: Cambri...

Getting Started with the Graph Query Language (GQL): A complete guide to designing, querying, and managing graph databas...

Building LLMs for Production: Enhancing LLM Abilities and Reliability with Prompting, Fine-Tuning, and RAG Author:Louis-...

Principles of Multimedia Author:Ranjan Parekh (Author) Publisher finelybook 出版社: CRC Press Publication date: 2025-06-29 ...