Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Discover
  • Series
  • Authors
  • File formats
  • Shelves

Discover (Random Books)

RHSA I

RHSA I

Susan Lauber, Philip Sweany , Rudolf Kastl, George Hacker

Red Hat System Administration (1)

Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking VoIP: Protocols, Attacks, and Countermeasures

Himanshu Dwivedi

A Guide to Convolutional Neural Networks for Computer Vision

A Guide to Convolutional Neural Networks for Computer Vision

Salman Khan & Hossein Rahmani & Syed Afaq Ali Shah & Mohammed Bennamoun

Pantalones cortos

Pantalones cortos

Lara RĂ­os & Fernando Carballo

Category: COM051440 - COMPUTERS / Software Development and Engineering / Tools

The DevOps 2.5 Toolkit

The DevOps 2.5 Toolkit

Viktor Farcic

Book Details

...