|
Data science at the command line : obtain, scrub, explore, and model data with Unix power tools |
Jeroen Janssens |
005.7/J A N |
2021 |
|
Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams |
Kasun Indrasiri
Sriskandarajah Suhothayan |
004.6782/I N D |
2021 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Cryptography and network security |
Joseph Alexander |
005.82/A L E |
2022 |
|
Web Application Security : exploitation and countermeasures for modern web applications |
Andrew Hoffman |
005.8/H O F |
2020 |
|
Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites |
Robin Nixon |
005.2762/N I X |
2021 |
|
Deep learning with Python : learn best practices of deep learning models with PyTorch |
Nikhil Ketkar
Jojo Moolayil |
005.133/K E T |
2021 |
|
Big data and machine learning in quantitative investment |
Tony Guida |
332.60285631/G U I |
2019 |
|
Embedded system design : embedded systems foundations of cyber-physical systems |
Peter Marwedel |
621.3815/M A R |
2006 |
|
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core |
Stephen Haunts |
003.54/H A U |
2019 |
|
Introduction to Algorithms for Data Mining and Machine Learning |
Xin-She Yang |
006.312/Y A N |
2019 |
|
Hacking connected cars : tactics, techniques, and procedures |
Alissa Knight |
629.046/K N I |
2020 |
|
New Frontiers in Artificial Intelligence |
|
006.3/N E W |
2022 |
|
Big Data Concepts Technology And Architecture |
|
005.7/B I G |
2022 |
|
Explainable Al with Python |
Leonida Gianfagna
Antonio Di Cecco |
005.133/G I A |
No.Y |
|
Cyber Security |
Markus Mack |
005.8/M A C |
2021 |
|
Big Data Analytics |
Raj Kamal
Preeti Saxena |
005.7/K A M |
2019 |
|
Cyber Laws Intellectual Property and E-Commerce Security |
Michael Nash |
346.54048/N A S |
2021 |
|
The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity |
Phil Quade |
005.8/Q U A |
2019 |
|
Cyber Crime |
Nash Haynes |
364.168/H A Y |
2022 |
|
The Ethics of Management |
Larue Tone Hosmer |
174.4/H O S |
1997 |
|
The Republic of Plato |
Francis Macdonald Cornford |
321.07/C O R |
1941 |
|
Concise history of western music |
Barbara Russanp Hanning |
780.9/H A N |
2006 |
|
An Introduction To Business Ethics |
Joseph Desjardins |
174.4/D E S |
2009 |
|
A dictionary of theoretical linguistics: English-Arabic, with and Arabic-English glassary |
Muhammad Ali Khuli |
R/423.1/K H U |
1982 |
|
Sense and Sensibility |
Jane Austen |
F/A U S |
2007 |
|
The rise, corruption and coming fall of the house of Saud |
Said K Aburish |
353.46/A B U |
1994 |
|
Glossary of conference terms : English, French, Arabic |
|
060.3/G L O |
1978 |
|
Southern theory : the global dynamics of knowledge in social science |
Raewyn Connell |
300.1/C O N |
2007 |
|
Manage the media : (dont let the media manage you) |
William J Holstein |
659.2/H O L |
2008 |