Optimization: Algorithms and Applications
Rajesh Kumar Arora
Introducing Maven
Balaji Varanasi & Sudha Belida
Logic and Discrete Mathematics: A Concise Introduction
Willem Conradie & Valentin Goranko
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Essentials of Economics
Paul Krugman & Robin Wells & Kathryn Graddy
Enterprise IPv6 for Enterprise Networks
Ghazi Mokammel Hossain
En una silla de ruedas
Carmen Lyra
Elasticsearch Essentials
Bharvi Dixit
Effective Perl Programming: Ways to Write Better, More Idiomatic ...
Joseph N. Hall & Joshua A. McAdams & Brian D Foy
Joseph N. Hall & Joshua McAdams & Brian D. Foy
Effective DevOps: Building a Culture of Collaboration, Affinity, ...
Jennifer Davis & Katherine Daniels
Docker: Up & Running
Karl Matthias & Sean P. Kane
Docker Deep Dive
Nigel Poulton
Docker Cookbook
Sébastien Goasguen
Docker Containers: From Start to Enterprise
Christopher Negus
The Docker Book: Containerization Is the New Virtualization
James Turnbull
Docker and Kubernetes for Java Developers
Jaroslaw Krochmalski
The DevOps 2.5 Toolkit
Viktor Farcic
DevEx as a Service
Matthew Casperson
Developing RESTful Web Services With Jersey 2. 0
Sunil Gulabani
Developing RESTful Services With JAX-RS 2.0, WebSockets, and ...
Masoud Kalali & Bhakti Mehta
The Design and Implementation of the FreeBSD Operating System
Marshall Kirk McKusick & George V. Neville-Neil & Robert N. M. Watson
Deploying Rails With Docker, Kubernetes and ECS
Pablo Acuña
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors
Joseph Yiu
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Deep Learning: Practical Neural Networks With Java
Yusuke Sugomori & Bostjan Kaluza & Fabio M. Soares & Alan M. F. Souza
The Debian Administrator's Handbook: Debian Squeeze From Discovery ...
Raphaël Hertzog & Roland Mas
Database System Concepts 6th Edition
Abraham Silberschatz & Henry Korth & S. Sudarshan
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Cuentos de mi tía Panchita
Cryptography in C and C++
Michael Welschenbach
Cryptography and Network Security: Principles and Practice (6th ...
William Stallings
Cryptography and Network Security: Principles and Practice (4th ...
Crypto101
Laurens Van Houtven
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
CoreOS Essentials
Rimantas Mocevicius
Continuous Delivery: Reliable Software Releases Through Build, ...
Jez Humble & David Farley
Continuous Delivery With Docker and Jenkins
Rafal Leszko
A Concise Introduction to Logic
Patrick Hurley
Computer Organization and Architecture: Designing for Performance
Computer Networks
Andrew S. Tanenbaum & David Wetherall
Computer Graphics, C Version
Donald Hearn & M. Pauline Baker
Computational Number Theory and Modern Cryptography
Song Y. Yan
The Complete Works of Leo Tolstoy (34 Complete Works of Leo ...
Leo Tolstoy
Comfortably Numb: The Inside Story of Pink Floyd
Mark Blake
Cocori
Joaquín Gutiérrez Mangel
Cisco CCIE Routing and Switching V5. 0
Narbik Kocharians & Peter Paluch & Wendell Odom
Cien Años de Soledad
Gabriel García Márquez
Chef Infrastructure Automation Cookbook
Matthias Marschall
Chef Cookbook - Third Edition
CentOS High Availability
Mitja Resman
CEH Certified Ethical Hacker Study Guide
Kimberly Graves
CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, ...
Todd Lammle
Cable Networks, Services, and Management
Mehmet Toy
C Programming: A Modern Approach
Kim N. King
C Programming: A Beginner's Course
Noel Kalicharan
C Primer Plus
Stephen Prata
Business Case Analysis With R: Simulation Tutorials to Support ...
Robert D. Brown Iii
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS ...
Ivan Ristic
Building Embedded Systems: Programmable Hardware
Changyi Gu
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder