RHSA I
Susan Lauber, Philip Sweany , Rudolf Kastl, George Hacker
Red Hat System Administration (1)
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
A Guide to Convolutional Neural Networks for Computer Vision
Salman Khan & Hossein Rahmani & Syed Afaq Ali Shah & Mohammed Bennamoun
Pantalones cortos
Lara RĂos & Fernando Carballo
The DevOps 2.5 Toolkit
Viktor Farcic