Dealing with Imbalanced and Weakly Labelled Data in Machine ...
Sarah Vluymans
Studies in Computational Intelligence (807)
Variational Text Linguistics: Revisiting Register in English
Christoph Schubert & Christina Sanchez-Stockhammer
Essays on the Philosophy of Music
Ernst Bloch
Python: Journey From Novice to Expert
Rick van Hattem & Dusty Phillips & Fabrizio Romano
McGraw-Hill's Dictionary of American Slang and Colloquial Expressions: ...
Richard A. Spears
Grokking Web Application Security
Malcolm McDonald
Windows Security Internals: A Deep Dive Into Windows Authentication, ...
James Forshaw
The Cybersecurity Manager's Guide: The Art of Building Your ...
Todd Barnum
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Data Engineering for Smart Systems: Proceedings of SSIC 2021
Priyadarsi Nanda & Vivek Kumar Verma & Sumit Srivastava & Rohit Kumar Gupta & Arka Prokash Mazumdar
Cybersecurity Architect's Handbook: An End-To-End Guide to Implementing ...
Lester Nichols
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Kali Linux Penetration Testing Bible
Gus Khawaja
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
The Private Production of Defense
Hans-Hermann Hoppe
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Penetration Testing for Dummies
Robert Shimonski