Algorithms Illuminated (Part 3): Greedy Algorithms and Dynamic ...
Tim Roughgarden
Self And Subjectivity - Excerpt
Judith P. Butler
Death—and After?
Annie Besant
Vatican Vendetta: A Thrilling Battle of Power and Politics
Peter Watson
Introduction to Algorithms, Fourth Edition
Charles E. Leiserson & Ronald L. Rivest & Clifford Stein & Thomas H. Cormen
Foundation Db2 and Python: Access DB2 With Module Based API ...
W. David Ashley
Mobile Edge Computing
Anwesha Mukherjee & Debashis de & Soumya K. Ghosh & Rajkumar Buyya
Connectivity and Edge Computing in IoT: Customized Designs and ...
Jie Gao & Mushu Li & Weihua Zhuang
Windows Server 2022 & PowerShell All-In-One for Dummies
Sara Perrott
Hacking for Dummies
Kevin Beaver
Edge Computing and IoT: Systems, Management and Security: Second ...
Kaishun Wu & Lu Wang & Yanjiao Chen
GreenEdge: New Perspectives to Energy Management and Supply ...
Guoming Tang & Deke Guo & Kui Wu
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Intensional First-Order Logic: From AI to New SQL Big Data
Zoran Majkic
Energy Efficient Computation Offloading in Mobile Edge Computing
Ying Chen & Ning Zhang & Yuan Wu & Sherman Shen
Computer Vision and Internet of Things
Lavanya Sharma & Mukesh Carpenter
Intelligent Internet of Things Networks
Haipeng Yao & Mohsen Guizani
Wireless Networks (1)
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Cloud Computing: Concepts, Technology, Security, and Architecture
Thomas Erl & Eric Monroy
Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-Native ...
Jason Morgan & Flynn