Practical Deep Reinforcement Learning with Python: Concise Implementation ...
Ivan Gridin
The Journal of Philosophy - Volume CXV, Number 6 - June 2018
The Journal of Philosophy
Principles and Practice in Second Language Acquisition (Language ...
Unknown
29 Questions to Get You on the Road to Rapid Continuous Improvement
Rebecca Millard
The Oxford Handbook of Hypnosis: Theory, Research, and Practice
Michael R. Nash & Amanda J. Barnier
Outlier Analysis
Charu C. Aggarwal
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Crypto Dictionary
Jean-Philippe Aumasson
Engineering Secure Internet of Things Systems
Benjamin Aziz & Alvaro Arenas & Bruno Crispo
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
Hacking for Dummies
Kevin Beaver
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Getting Started With OAuth 2.0
Ryan Boyd
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's ...
Peter Bradley
Hacking With Kali: Practical Penetration Testing Techniques
James Broad & Andrew Bindner
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic ...
Duncan Buell
OpenStack in Action
Cody Bumgardner
DevOps and Containers Security: Security and Monitoring in Docker ...
Jose Manuel Ortega Candel
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar