Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Discover
  • Series
  • Authors
  • File formats
  • Shelves

Discover (Random Books)

Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking VoIP: Protocols, Attacks, and Countermeasures

Himanshu Dwivedi

Implementing Cloud Design Patterns for AWS

Implementing Cloud Design Patterns for AWS

Marcus Young

Foundation

Foundation

Isaac Asimov

Foundation (1)

Corporate Computer Security

Corporate Computer Security

Randy J Boyle & Raymond R. Panko

Category: Algorithms

Keras to Kubernetes: The Journey of a Machine Learning Model to Production

Keras to Kubernetes: The Journey of a Machine Learning Model ...

Dattaraj Rao

Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services

Designing Distributed Systems: Patterns and Paradigms for Scalable, ...

Brendan Burns

Mastering Machine Learning With R

Mastering Machine Learning With R

Cory Lesmeister

Apache Mahout Essentials

Apache Mahout Essentials

Jayani Withanawasam

Optimization: Algorithms and Applications

Optimization: Algorithms and Applications

Rajesh Kumar Arora

The Art of Computer Programming: Sorting and Searching

The Art of Computer Programming: Sorting and Searching

Donald E. Knuth

The Art of Computer Programming (3)

The Art of Computer Programming: Seminumerical Algorithms

The Art of Computer Programming: Seminumerical Algorithms

Donald E. Knuth

The Art of Computer Programming (2)

What Is Computer Science?: An Information Security Perspective

What Is Computer Science?: An Information Security Perspective

Daniel Page & Nigel Smart

OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL Features and Commands

OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL ...

Ivan Ristic

Book Details

...