Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Discover
  • Series
  • Authors
  • File formats
  • Shelves

Discover (Random Books)

Hack and HHVM: Programming Productivity Without Breaking Things

Hack and HHVM: Programming Productivity Without Breaking Things

Owen Yamauchi

Bash Pocket Reference

Bash Pocket Reference

Arnold Robbins

Theory of Computation

Theory of Computation

George Tourlakis

Docker and Kubernetes for Java Developers

Docker and Kubernetes for Java Developers

Jaroslaw Krochmalski

Category: Information Technology

Hackers :: Heroes of the Computer Revolution. (Reloaded)

Hackers :: Heroes of the Computer Revolution. (Reloaded)

Steven Levy

Hard Real-Time Computing Systems: Predictable Scheduling Algorithms and Applications

Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...

Giorgio C Buttazzo

Corporate Computer Security

Corporate Computer Security

Randy J Boyle & Raymond R. Panko

Jenkins Continuous Integration Cookbook

Jenkins Continuous Integration Cookbook

Alan Berg

Mathematical Logic for Computer Science

Mathematical Logic for Computer Science

Mordechai Ben-Ari

Computational Number Theory and Modern Cryptography

Computational Number Theory and Modern Cryptography

Song Y. Yan

PMP® Exam Practice Test and Study Guide, Ninth Edition

PMP® Exam Practice Test and Study Guide, Ninth Edition

J. Leroy Ward, Pmp, Pgmp & Ginger Levin

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Advanced Persistent Threat Hacking: The Art and Science of Hacking ...

Tyler Wrightson

Moving to Office 365: Planning and Migration Guide

Moving to Office 365: Planning and Migration Guide

Matthew Katzer

When We Are No More: How Digital Memory Is Shaping Our Future

When We Are No More: How Digital Memory Is Shaping Our Future

Abby Smith Rumsey

Migrating Large-Scale Services to the Cloud

Migrating Large-Scale Services to the Cloud

Eric Passmore

Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide

Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...

Luis Ayala

Deploying Rails With Docker, Kubernetes and ECS

Deploying Rails With Docker, Kubernetes and ECS

Pablo Acuña

Machine Learning Using R: With Time Series and Industry-Based Use Cases in R

Machine Learning Using R: With Time Series and Industry-Based ...

Karthik Ramasubramanian & Abhishek Singh

Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification

Practical LPIC-3 300: Prepare for the Highest Level Professional ...

Antonio Vazquez

Architecting and Operating OpenShift Clusters: OpenShift for Infrastructure and Operations Teams

Architecting and Operating OpenShift Clusters: OpenShift for ...

William Caban

Book Details

...