Title: CyberBulleys: A CISO's Guide to Doing Cybersecurity:, Author: Jody Blanchard
Title: Discrete Structures with Contemporary Applications, Author: Alexander Stanoyevitch
Title: Combinatorics of Set Partitions, Author: Toufik Mansour
Title: Applications of Combinatorial Matrix Theory to Laplacian Matrices of Graphs, Author: Jason J. Molitierno
Title: Group Theoretic Cryptography, Author: Maria Isabel González Vasco
Title: Algebraic Number Theory, Author: Richard A. Mollin
Title: How to Count: An Introduction to Combinatorics, Second Edition, Author: R.B.J.T. Allenby
Title: Customizable and Adaptive Quantum Processors: Theory and Applications, Author: Nadia Nedjah
Title: Handbook of the Tutte Polynomial and Related Topics, Author: Joanna A. Ellis-Monaghan
Title: Combinatorics of Permutations, Author: Miklos Bona
Title: MacBook For Dummies, Author: Mark L. Chambers
Title: Mastering Microsoft Intune - Second Edition: Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite, Author: Christiaan Brinkhoff
Title: Deterministic and Stochastic Optimal Control and Inverse Problems, Author: Baasansuren Jadamba
Title: The Design and Implementation of the RT-Thread Operating System, Author: Qiu Yi
Title: The Kubernetes Book: Starfleet Edition, Author: Nigel Poulton
Title: The Kubernetes Book: Borg Collector's Edition, Author: Nigel Poulton
Title: The Kubernetes Book: Klingon edition, Author: Nigel Poulton
Title: Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU, Author: Antonio Nappa
Title: Zoom for Beginners: The Top 5 Hidden Features To Master Zoom Meetings For Teachers And Take The Quality Of Your Audio And Video Lessons, Author: Maxine Taryn
Title: Discrete Encounters, Author: Craig Bauer

Pagination Links