Fundamentals of Mathematics: Functions and Graphs
Sanjay Mishra
How Europe Underdeveloped Africa
Walter Rodney
Barbarians at the Gate: The Fall of RJR Nabisco
Bryan Burrough & John Helyar
How Consciousness Became the Universe:: Quantum Physics, Cosmology, ...
Roger Penrose & Deepak Chopra & Henry P. Stapp & Brandon Carter & York H. Dobyns & Menas Kafatos & Michael B. Mensky & Gordon Globus & Subhash Kak & Stuart R. Hameroff
Ubuntu Linux Toolbox
Christopher Negus & Francois Caen
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-Native ...
Jason Morgan & Flynn
Cloud Computing: Concepts, Technology, Security, and Architecture
Thomas Erl & Eric Monroy
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Intelligent Internet of Things Networks
Haipeng Yao & Mohsen Guizani
Wireless Networks (1)
Computer Vision and Internet of Things
Lavanya Sharma & Mukesh Carpenter
Energy Efficient Computation Offloading in Mobile Edge Computing
Ying Chen & Ning Zhang & Yuan Wu & Sherman Shen
Intensional First-Order Logic: From AI to New SQL Big Data
Zoran Majkic
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
GreenEdge: New Perspectives to Energy Management and Supply ...
Guoming Tang & Deke Guo & Kui Wu
Cloud Computing Solutions: Architecture, Data Storage, Implementation ...
Souvik Pal & Dac-Nhuong le & Prasant Kumar Pattnaik
Edge Computing and IoT: Systems, Management and Security: Second ...
Kaishun Wu & Lu Wang & Yanjiao Chen
Cybersecurity for Dummies
Joseph Steinberg
Hacking for Dummies
Kevin Beaver
Windows Server 2022 & PowerShell All-In-One for Dummies
Sara Perrott
Connectivity and Edge Computing in IoT: Customized Designs and ...
Jie Gao & Mushu Li & Weihua Zhuang
Mobile Edge Computing
Anwesha Mukherjee & Debashis de & Soumya K. Ghosh & Rajkumar Buyya
Foundation Db2 and Python: Access DB2 With Module Based API ...
W. David Ashley
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Kali Linux Penetration Testing Bible
Gus Khawaja