Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Discover
  • Series
  • Authors
  • File formats
  • Shelves

Discover (Random Books)

Mastering Apache Maven 3

Mastering Apache Maven 3

Prabath Siriwardena

C# 7 and .NET Core: Modern Cross-Platform Development - Second Edition

C# 7 and .NET Core: Modern Cross-Platform Development - Second ...

Mark J. Price

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Implementing Cybersecurity: A Guide to the National Institute ...

Anne Kohnke & Ken Sigler & Dan Shoemaker

Pro Vim

Pro Vim

Mark McDonnell

Category: Information Technology

When We Are No More: How Digital Memory Is Shaping Our Future

When We Are No More: How Digital Memory Is Shaping Our Future

Abby Smith Rumsey

Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification

Practical LPIC-3 300: Prepare for the Highest Level Professional ...

Antonio Vazquez

PMP® Exam Practice Test and Study Guide, Ninth Edition

PMP® Exam Practice Test and Study Guide, Ninth Edition

J. Leroy Ward, Pmp, Pgmp & Ginger Levin

Moving to Office 365: Planning and Migration Guide

Moving to Office 365: Planning and Migration Guide

Matthew Katzer

Migrating Large-Scale Services to the Cloud

Migrating Large-Scale Services to the Cloud

Eric Passmore

Mathematical Logic for Computer Science

Mathematical Logic for Computer Science

Mordechai Ben-Ari

Machine Learning Using R: With Time Series and Industry-Based Use Cases in R

Machine Learning Using R: With Time Series and Industry-Based ...

Karthik Ramasubramanian & Abhishek Singh

Jenkins Continuous Integration Cookbook

Jenkins Continuous Integration Cookbook

Alan Berg

Hard Real-Time Computing Systems: Predictable Scheduling Algorithms and Applications

Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...

Giorgio C Buttazzo

Hackers :: Heroes of the Computer Revolution. (Reloaded)

Hackers :: Heroes of the Computer Revolution. (Reloaded)

Steven Levy

Deploying Rails With Docker, Kubernetes and ECS

Deploying Rails With Docker, Kubernetes and ECS

Pablo Acuña

Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide

Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...

Luis Ayala

Corporate Computer Security

Corporate Computer Security

Randy J Boyle & Raymond R. Panko

Computational Number Theory and Modern Cryptography

Computational Number Theory and Modern Cryptography

Song Y. Yan

Architecting and Operating OpenShift Clusters: OpenShift for Infrastructure and Operations Teams

Architecting and Operating OpenShift Clusters: OpenShift for ...

William Caban

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Advanced Persistent Threat Hacking: The Art and Science of Hacking ...

Tyler Wrightson

Book Details

...