Boost.Asio C++ Network Programming Cookbook.epub510.5 KB
Web Performance in Action: Building Fast Web Pages.pdf30.7 MB
The API Obsession and why it matters.pdf462.6 KB
A Short History of Data Storage.pdf2.0 MB
Foundations of Logic and Mathematics Applications to Computer Science and Cryptography.pdf11.5 MB
MAC Protocols for Cyber Physical Systems.pdf3.1 MB
Linux & Open Source: The Essential Guide to Mastering Open Source Software and Operating Systems.pdf43.3 MB
Instant Kali Linux - A Quick Guide To Learn The Most Widely Used Operating System By Network Security Professionals.pdf3.4 MB
Computer Architecture: Pipelined and Parallel Processor Design.epub11.8 MB
Introduction to Data Science: A Python Approach to Concepts, Techniques and Applications.pdf6.9 MB
Guide to Convolutional Neural Networks: A Practical Application to Traffic-Sign Detection and Classification.pdf13.6 MB
10 Things You Must Do With a Brand New Router.pdf1.1 MB
Network Tutorial 5th Edition.epub5.9 MB
Negotiating Success: Tips and Tools for Building Rapport and Dissolving Conflict While Still Getting What You Want.pdf2.1 MB
HTML5 Programming Cookbook.pdf3.1 MB
Why IT Struggles with Mobility.pdf1.9 MB
Network And Computer Systems Administrators: Occupational Outlook.pdf1.6 MB
Multiscreen UX Design: Developing for a Multitude of Devices.pdf43.0 MB
Enterprise Readiness of Consumer Mobile Platforms.pdf1.1 MB
Guide to Computer Network Security, 3rd edition.pdf7.0 MB
Umts Security Book.pdf2.3 MB
Advances in Network and Distribuded Systems Security.pdf2.1 MB
CCNA Security Course Booklet 1.0.pdf16.9 MB
Introduction to Statistical Machine Learning.pdf17.7 MB
VDI in Financial Services White Paper: Maximizing VDI User Experience in Financial Services - The importance of testing in your desktop virtualization environment.pdf764.8 KB
How to become a Web Developer.pdf2.1 MB
Cisco Network Security Little Black Book.pdf3.0 MB
CCNA Exploration Routing Protocols and Concepts: Course Booklet.pdf12.4 MB
Sams TeachYourself HTML, CSS & JavaScript Web Publishing in One Hour a Day 7th Edition.pdf44.9 MB
Beginning Android Games For Android 7.0 3rd Edition.pdf11.9 MB
Communication Hacking: 5 Actionable Keys for Cultivating Powerful Conversational Change.pdf23.5 MB
Internet of Things Principles and Paradigms.pdf21.5 MB
R in Action: Data Analysis and Graphics with R 2nd Edition.epub13.2 MB
Foundations of Quantum Programming.pdf2.8 MB
Computational Network Science An Algorithmic Approach.pdf8.1 MB
Web Developer Interview Questions and Answers.pdf2.0 MB
The Cyber Pirates: A Comprehensive Guide to the Internet from a Hacker's Eye.pdf4.4 MB
Cyber Threat- How to Manage the Growing Risk of Cyber Attacks.pdf1.7 MB
The Python Book: The Ultimate Guide to Coding with Python 2017.pdf26.9 MB
Advanced Linux 3D Graphics Programming.pdf14.9 MB
Mastering Bitcoin - Programming the Open Blockchain - 2nd Edition.epub8.7 MB
Programming a Game with Unity: A Beginner's Guide.pdf848.3 KB
Hyper-V Security: Secure your Hyper-V hosts and services from intruders and malware.pdf4.3 MB
Computer Organization Design and Architecture.pdf12.5 MB
Create Mobile Games with Corona: Build on iOS and Android.pdf5.2 MB
Linux Tips, Tricks, Apps & Hacks.pdf38.3 MB
The Software Developer’s Guide to Getting a Job.pdf380.5 KB
HTML 5 Modern Day Attack And Defence Vectors.pdf1.7 MB
Modern Programming Made Easy: Using Java, Scala, Groovy, and JavaScript.pdf2.8 MB
Systems Analysis and Design - 11th Edition.pdf38.5 MB
Getting Started with IntelliJ IDEA: Exploit IntelliJ IDEA’s unique features to rapidly develop web and Java Enterprise applications.pdf1.8 MB
Bulletproof Java Code: A Practical Strategy for Developing Functional, Reliable, and Secure Java Code.pdf230.5 KB
Cross-Platform Game Development: Making PC Games for Windows, Linux, And Mac.pdf14.0 MB
Cisco ACI Cookbook.pdf26.7 MB
Groovy 2 Cookbook.pdf25.1 MB
7 Principles to Upgrade Your Work and Life.pdf468.9 KB
Procedural Content Generation for Unity Game Development.pdf5.7 MB
CompTIA Server+ Study Guide.pdf61.8 MB
Vector Calculus, Linear Algebra, And Differential Forms: A Unified Approach.djvu9.3 MB
Honeypots: A New Paradigm to Information Security.pdf3.6 MB
Wimax Security And Quality Of Service Book.pdf4.1 MB
Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters.pdf1.2 MB
Microsoft Excel Your Way to a Better Job.pdf6.9 MB
Introducing Maven.epub1.8 MB
Linux Administration: A Beginner’s Guide 7th Edition.pdf7.8 MB
VirtualMin Tips & Hacks: How to Setup VirtualMin with PHP-FPM and NGinx Reverse Proxy.epub2.1 MB
WiFi Hacking for Beginners Learn Hacking by Hacking WiFi networks (2017).pdf603.4 KB
The Thought Leader Manifesto: Strategies for Building & Leverage Your Influence.pdf324.3 KB
Unity Animation Essentials.pdf9.0 MB
Structured Search for Big Data From Keywords to Key-objects.pdf6.5 MB
Growth gets complicated: Prepare to scale your business with cloud-based, single-source financial and commerce management.pdf807.9 KB
Linux - The Complete Manual: Easy Step-by-Step Workshops.pdf16.6 MB
Guide to Flow-Aware Networking: Quality-of-Service Architectures and Techniques for Traffic Management.pdf11.1 MB
Advanced Penetration Testing: Hacking the World's Most Secure Networks.epub3.2 MB
The Training Employee Plan Playbook.pdf196.0 KB
Google Analytics Integrations.pdf5.9 MB
MMOs from the Outside In: The Massively Multiplayer Online Role-Playing Games of Psychology, Law, Government, and Real Life.pdf4.7 MB
Pro Unity Game Development with Csharp - PDF Books.pdf10.1 MB
Your Complete Guide to Windows Customization.pdf2.3 MB
Developing Online Games: An Insider's Guide.chm2.7 MB
Introductory College Mathematics with Linear Algebra and Finite Mathematics.pdf18.7 MB
Apache Maven Dependency Management.epub3.4 MB
AWS Certified Solutions Architect: Official Study Guide.pdf10.8 MB
A Practical Guide To Fedora And Red Hat Enterprise Linux 6th Edition.pdf11.3 MB
PMP Project Management Professional Exam Study Guide 8th Edition.epub1.9 MB
How to Fix 5 Common iPhone & iPad Security Threats.pdf931.2 KB
CCNA Routing and Switching Complete Study Guide 2nd Edition.epub17.5 MB
Data Science & Complex Networks.pdf3.2 MB
The Managers Guide to Web Application Security.pdf2.0 MB
Beginning Hibernate: Effectively Learn Hibernate, Including Coverage of Latest Hibernate 4.pdf2.5 MB
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security.epub9.3 MB
Railway Infrastructure Security.pdf6.6 MB
Juniper Networks Warrior.epub8.0 MB
JSP Java Server Pages.pdf774.9 KB
Spring Data: Modern Data Access for Enterprise Java.epub6.2 MB
Bash It Out - Strengthen Your Bash knowledge with 17 Scripting Challenges.pdf1.7 MB
CoreOS in Action: Running Applications on Container Linux.pdf5.3 MB
Web Server Administration: Web Warrior Series.pdf14.1 MB
Unity in Action: Covers Unity 5.0 Multiplatform Game Development in C#.epub9.9 MB
CCNP TSHOOT 6.0 Student Lab Manual.pdf44.1 MB
Geometry Essentials For Dummies.epub9.7 MB
Linux Developers: Jumpstart Your Linux Programming Skills.pdf5.7 MB
A Course in Linear Algebra.pdf23.3 MB
Virtualization Essentials 2nd Edition.pdf11.1 MB
Understanding the Linux Virtual Memory Manager.pdf8.3 MB
Effective DevOps: Building a Culture of Collaboration, Affinity, and Tooling at Scale.epub6.2 MB
Untangle Network Security.pdf8.2 MB
Cyber Security Policy Guidebook.pdf3.2 MB
Malware Diffusion Models for Modern Complex Networks: Theory and Applications.pdf8.4 MB
Linear Algebra, Geodesy, and GPS.djvu4.4 MB
Cybersecurity 101: What You Absolutely Must Know Vol.1 Learn How not to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics and Much More.pdf614.0 KB
Expert C++-CLI: .NET for Visual C++ Programmers.pdf2.6 MB
Thse Are the Droids you are looking for: An Android Guide.pdf2.0 MB
Roaming In Wireless Networks Book.pdf2.4 MB
Linux Networking Clearly Explained.pdf1.3 MB
Apache Maven Cookbook: Over 90 hands-on recipes to succesfully build and automate development life cycle tasks following Maven conventions and best practices.epub16.4 MB
How to Become a DATA GOVERNANCE EXPERT.pdf4.1 MB
Unity Character Animation With Mecanim.pdf5.9 MB
Android and iOS Apps Testing at a Glance.pdf1.5 MB
Opensuse Linux Unleashed.pdf11.9 MB
31 Days Before Your CCENT Certification.pdf1.7 MB
Open Networks: When Users Create a Network.pdf2.8 MB
OCP Oracle Certified Professional Programmer II Study Guide Exam 1Z0-809.pdf13.4 MB
The Essential Work-Life Balance Cheat Sheet.pdf1.9 MB
5 Lightweight Linux Distros Ideal for an Intel Atom Processor PC.pdf3.5 MB
Java Application Development on Linux.pdf3.2 MB
Self- and Co- regulation in Cybercrime, Cybersecurity and National Security.pdf1.6 MB
Computer Security ESORICS 2013 - 18th European Symposium on Research in Computer Security.pdf8.0 MB
Alternatives to Prison: Options for and Insecure Society.pdf2.5 MB
Intrusion Detection in Wireless Ad-Hoc Networks.pdf4.5 MB
Signals and Communication Technology.pdf12.8 MB
Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications.pdf7.9 MB
Make - Making Things Smart.pdf38.3 MB
Groovy in Action: Covers Groovy 2.4 2nd Edition.pdf20.2 MB
Groovy and Grails Recipes.pdf3.2 MB
Can You Run It On Linux: 10 Vital Apps You’ll Want When You Switch.pdf520.8 KB
A Comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps.pdf3.1 MB
Geometry For Dummies.epub11.0 MB
DDoS Attacks Evolution, Detection, Prevention, Reaction, and Tolerance.pdf10.0 MB
Blogs: 21st Century Skills Innovation in Entertainment.pdf1.4 MB
Cybersecurity for Executives A Practical Guide.pdf2.6 MB
Simple CISSP.pdf1.3 MB
Programming In C Unix System Calls And Subroutines Using C.pdf2.8 MB
Introduction to Computer Networks and Cybersecurity.pdf39.5 MB
The Essential Cyber Security Handbook.pdf905.0 KB
Python Web Scraping - 2nd Edition.pdf14.8 MB
Clojure for Finance: Leverage the power and flexibility of the Clojure language for finance.pdf1.6 MB
BAE Systems Business Defense 2017.pdf1.1 MB
PKI Implementing and Managing E-Security.pdf9.9 MB
wxPython Application Development Cookbook: Over 80 step-by-step recipes to get you up to speed with building your own wxPython applications.pdf2.5 MB
Hacking Secret Ciphers with Python.pdf6.6 MB
Unreal Engine Physics Essentials.pdf10.5 MB
MMOs from the Inside Out: The History, Design, Fun, and Art of Massively-Multiplayer Online Role-Playing Games.pdf9.6 MB
Android TV Apps Development: Building for Media and Games.pdf2.1 MB
Cisco ISE for BYOD and Secure Unified Access.pdf22.1 MB
Transnational Security.pdf3.6 MB
Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs.pdf1.5 MB
CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001.epub5.7 MB
Multiplayer Game Development with HTML5: Build fully-featured, highly interactive multiplayer games with HTML5.pdf2.0 MB
Data Analysis with R Source Code/Chapter 13/nyc-sat-scores.Rmd4.2 KB
Data Analysis with R Source Code/Chapter 13/nyc-sat-scores.R4.1 KB
Data Analysis with R Source Code/Chapter 10/music-recommendations.R4.6 KB
Data Analysis with R Source Code/Chapter 12/our_cpp_functions.cpp1.7 KB
Data Analysis with R Source Code/Chapter 12/chapter12.R5.8 KB
OpenCV By Example: Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3.pdf14.6 MB
Linux Recipes For Oracle Dbas.pdf7.7 MB
Nmap: Network Exploration and Security Auditing Cookbook 2nd Edition.azw31.3 MB
Simulation Technologies In Networking And Communications.pdf13.4 MB
The Best Tweaks You Can Make To Your Android Without Rooting.pdf261.5 KB
Oracle Database Gateway Installation And Configuration Guidefor Linux.pdf1.0 MB
Guide to Wireless Mesh Networks.pdf13.4 MB
Concurrent Programming on Windows - Free Pdf Book.pdf8.8 MB
Hacking Exposed Mobile Security Secrets And Solutions.pdf5.7 MB
Upgrading and Repairing Networks.chm16.5 MB
8 Instances You Weren’t Using a VPN, but Should’ve Been; The VPN Checklist: Should You Be Using One.pdf1.8 MB
Understanding IPv6 Covers Windows 8 and Windows Server 2012.pdf26.7 MB
Sentiment Analysis in Social Networks.pdf10.4 MB
Head First Agile: A Brain-Friendly Guide.pdf52.6 MB
PCI DSS v3-2: Requirements and Security Assessment Procedures.pdf1.7 MB
Hacking Raspberry Pi.pdf19.1 MB
IntelliJ IDEA Essentials: Develop better software fast with IntelliJ IDEA.pdf7.0 MB
Data Mining Practical Machine Learning Tools and Techniques 4th Edition.pdf4.0 MB
Ajax Hacks.epub2.9 MB
GNU-Linux Rapid Embedded Programming: Your one-stop solution to embedded programming on GNU-Linux.pdf33.1 MB
Everyday Data Structures.epub566.8 KB
Computer security: a 5-minute talk to owners of small businesses, home businesses, and to home users.pdf413.7 KB
Getting Started with Java EE Security.pdf2.6 MB
SDN and NFV Simplified: A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization.epub15.1 MB
How to Install Android on Your PC With Remix OS 3.0.pdf1.7 MB
WHITEPAPER: How to Transform Employee Worst Practices Into Enterprise Best Practices.pdf2.8 MB
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation.pdf13.8 MB
Digital Security- Cyber Terror and Cyber Security.pdf12.0 MB
How to Use Android without Google.pdf2.2 MB
A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP.pdf1.7 MB
Homicide Investigation: An Introduction.pdf14.7 MB
Network+ Guide to Networks 7th Edition.pdf47.5 MB
A Comprehensive Guide to Virtual Private Networks, Volume III: Cross-Platform Key and Policy Management.pdf8.6 MB
The Complete Visual Guide to Good Dog Training (2012).epub142.6 MB
Big Data: Principles and Paradigms.pdf35.7 MB
Mathematical Foundations of Public Key Cryptography.pdf5.2 MB