The Selfish Gene: 30th Anniversary Edition
Richard Dawkins
UMTS Networks: Architecture, Mobility and Services
Heikki Kaaranen & Ari Ahtiainen & Lauri Laitinen & Siamäk Naghian & Valtteri Niemi
21st Century C: C Tips From the New School
Ben Klemens
An Introduction to Optimization
Edwin K. P. Chong & Stanislaw H. Zak
Java EE 7 Developer Handbook
Peter A. Pilgrim
Java 9 Revealed: For Early Adoption and Migration
Kishori Sharan
Java 9 High Performance
Mayur Ramgir
Java 8 Lambdas: Pragmatic Functional Programming
Richard Warburton
Java 8 in Action: Lambdas, Streams, and Functional-Style Programming
Raoul-Gabriel Urma & Mario Fusco & Alan Mycroft
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon
Is Parallel Programming Hard, And, If So, What Can You Do About ...
Paul E. McKenney
IPv6 Fundamentals: A Straightforward Approach to Understanding ...
Rick Graziani
IPv6 Essentials
Silvia Hagen
Ipv6 Essentials
IPv6 Deployment and Management
Michael Dooley & Timothy Rooney
An Introduction to the Mathematics of Financial Derivatives
Ali Hirsa & Salih N. Neftci
Introduction to Probability Models, Tenth Edition
Sheldon M. Ross
An Introduction to Linear Algebra
Ravi P. Agarwal & Elena Cristina Flaut
Introduction to 64 Bit Intel Assembly Language Programming for ...
Ray Seyfarth
Introducing Maven
Balaji Varanasi & Sudha Belida
Intellectual Property and Open Source
van Lindberg
The Intel Microprocessors (8th Edition)
Barry B. Brey
Implementing Samba 4
Marcelo Leal
Implementing Cybersecurity: A Guide to the National Institute ...
Anne Kohnke & Ken Sigler & Dan Shoemaker
Implementing Cloud Design Patterns for AWS
Marcus Young
The Illustrated Network: How TCP/IP Works in a Modern Network
Walter Goralski
HTTP/2 in Action
Barry Pollard
HTML5 Pocket Reference
Jennifer Niederst Robbins
How Linux Works: What Every Superuser Should Know
Brian Ward
The History of the Incas
Pedro Sarmiento de Gamboa & Brian S. Bauer & Vania Smith
High Performance Python: Practical Performant Programming for ...
Micha Gorelick & Andy R. Terrel & Ian Ozsvald
High Performance Browser Networking: What Every Web Developer ...
Ilya Grigorik
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Handbook of Inca Mythology
Paul Richard Steele & Catherine Jean Allen
Hadoop Cluster Deployment
Danil Zburivsky
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
A Guide to Convolutional Neural Networks for Computer Vision
Salman Khan & Hossein Rahmani & Syed Afaq Ali Shah & Mohammed Bennamoun
Groovy in Action: Covers Groovy 2.4
Erik Pragt
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
Google Cloud Platform in Action
John J. Geewax & John Geewax
The GNU Make Book
John Graham-Cumming
GNS3 Network Simulation Guide
Rednectar Chris Welsh
Gitolite Essentials
Sitaram Chamarty
Git Pocket Guide
Richard E. Silverman
Git Fundamentals
Thom Parkin
Git Essentials
Ferdinando Santacroce
Getting Started With oVirt 3.3
Alexey Lesovsky
Getting Started With Memcached
Ahmed Soliman
Getting Started With MariaDB - Second Edition
Daniel Bartholomew
Getting Started With Kubernetes - Second Edition: Orchestrate ...
Jonathan Baier
Get Rid of Your Accent [British-English]
Linda James & Olga Smith
Genetic Programming: On the Programming of Computers by Means ...
John R. Koza
From GSM to LTE-Advanced: An Introduction to Mobile Networks ...
Martin Sauter
Freethinkers: A History of American Secularism
Susan Jacoby
Free Money for All: A Basic Income Guarantee Solution for the ...
Walker
Extreme Metal: Music and Culture on the Edge
Keith Kahn-Harris
Expert C Programming: Deep C Secrets
Peter van Der Linden
Ethical Hacking and Countermeasures: Web Applications and Data ...
Ec-Council
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...