Title: CyberBulleys: A CISO's Guide to Doing Cybersecurity:, Author: Jody Blanchard
Title: Combinatorics of Set Partitions, Author: Toufik Mansour
Title: How to Count: An Introduction to Combinatorics, Second Edition, Author: R.B.J.T. Allenby
Title: Algebraic Number Theory, Author: Richard A. Mollin
Title: Discrete Structures with Contemporary Applications, Author: Alexander Stanoyevitch
Title: Customizable and Adaptive Quantum Processors: Theory and Applications, Author: Nadia Nedjah
Title: Handbook of the Tutte Polynomial and Related Topics, Author: Joanna A. Ellis-Monaghan
Title: Combinatorics of Permutations, Author: Miklos Bona
Title: MacBook For Dummies, Author: Mark L. Chambers
Title: Mastering Microsoft Intune - Second Edition: Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite, Author: Christiaan Brinkhoff
Title: Deterministic and Stochastic Optimal Control and Inverse Problems, Author: Baasansuren Jadamba
Title: The Design and Implementation of the RT-Thread Operating System, Author: Qiu Yi
Title: The Kubernetes Book: Starfleet Edition, Author: Nigel Poulton
Title: Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU, Author: Antonio Nappa
Title: Zoom for Beginners: The Top 5 Hidden Features To Master Zoom Meetings For Teachers And Take The Quality Of Your Audio And Video Lessons, Author: Maxine Taryn
Title: Discrete Encounters, Author: Craig Bauer
Title: Discrete Mathematics and Applications, Author: Kevin Ferland
Title: Graph Theory and Its Applications, Author: Jonathan L. Gross
Title: Heterogeneous Computing Architectures: Challenges and Vision, Author: Olivier Terzo
Title: TALK TO ME - Password Log Book and Internet Addresses I Can't Remember: Internet Password Organizer, Author: Pick Me Read Me Press

Pagination Links