Ernst Cassirer’s philosophy of biology - Paper
John Michael Krois
John D. Rockefeller: Anointed With Oil
Grant Segall
The Conscious Enneagram: How to Move From Typology to Transformation
Abi Robins
Literature and Stylistics for Language Learners Theory and Practice
Greg Watson & Sonia Zyngier
A Companion to the Philosophy of History and Historiography
Aviezer Tucker
Pro Cryptography and Cryptanalysis
Marius Iulian Mihailescu & Stefania Loredana Nita
Advanced Platform Development With Kubernetes
Craig Johnston
Edge AI
Xiaofei Wang & Yiwen Han & Victor C. M. Leung & Dusit Niyato & Xueqiang Yan & Xu Chen
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Virtual, Augmented and Mixed Reality: Design and Development
Jessie Y. C. Chen & Gino Fragomeni
Lecture Notes in Computer Science (13317)
Understanding Network Hacks
Bastian Ballmann
PowerShell and Python Together
Chet Hosmer
Mastering Python Scripting for System Administrators
Ganesh Sanjiv Naik
Network Hacks - Intensivkurs
Complex Network Analysis in Python
Dmitry Zinoviev
Beginning Ethical Hacking With Python
Sanjib Sinha
Deep Learning Mit Python Und Keras
François Chollet
Python Testing With Selenium
Sujay Raghavendra
Risikomanagement Kompakt
Christof Ebert
IT kompakt (1)
Hands-On Enterprise Automation on Linux
James Freeman
Docker Networking Cookbook
Jon Langemak
Intrusion Detection
Nandita Sengupta & Jaya Sil
Cognitive Intelligence and Robotics (1)
Core Data Analysis: Summarization, Correlation, and Visualization
Boris Mirkin
Undergraduate Topics in Computer Science (1)
Learn Penetration Testing with Python 3.x: Perform Offensive ...
Yehia Elghaly