Natural Language Processing with PyTorch
Delip Rao & Brian McMahan
Mathematics for Computer Graphics and Game Programming
D. P. Kothari, PhD, G. K. Awari, PhD, D. D. Shrimankar, PhD, ...
Property-Based Testing with PropEr, Erlang, and Elixir
Fred Hebert
Xamarin.Forms Projects
Johan Karlsson
Compassionate Cuisine
Linda Soper-Kolton & Sara Boan
Sweet Vegan Treats
Hannah Kaminsky
Smartphone-Based Real-Time Digital Signal Processing: Second ...
Nasser Kehtarnavaz & Abhishek Sehgal & Shane Parris
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Attacking Network Protocols
James Forshaw
One-Track Mind
Philip Ashforth Coppola
Printing Architecture
Ronald Rael & Virginia San Fratello
A2Z+: Alphabets & Signs
Julian Rothenstein
The Senses
Ellen Lupton & Andrea Lipps
Coffee Lids
Louise Harpman & Scott Specht
Graphic Design Discourse
Henry Hongmin Kim
How to Make Hand-Drawn Maps
Helen Cann
The Taco Tuesday Cookbook
Laura Fuentes
Simply Bento
Yuko & Noriko
The Nightmare Before Dinner
Zach Neil
The Japanese Larder
Luiz Hara
The Geeky Chef Drinks
Cassandra Reeder
The Essential Cook’s Kitchen
Alison Walker
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Pro Spring Boot 2: An Authoritative Guide, 2nd edition
Felipe Gutierrez
Java in a Nutshell
David Flanagan & Benjamin J. Evans
Hands-On Data Structures and Algorithms with Python
Dr. Basant Agarwal
What Vegans Eat
Brett Cobley
Hands-On Server-Side Web Development with Swift
Angus Yeung
Android 9 Application Development Cookbook
Rick Boyer
AWS Certified Solutions Architect Practice Tests
Brett McLaughlin
CompTIA Security+ Certification Guide
Ian Neil
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Mastering Kali Linux for Advanced Penetration Testing, Second ...
Vijay Kumar Velu
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Web Penetration Testing with Kali Linux - Third Edition
Gilberto Nájera-Gutiérrez
Digital Forensics and Incident Response
Gerard Johansen
Learning Malware Analysis
MONNAPPA K A
Practical Cyber Intelligence
Wilson Bautista Jr.
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
Ben Malisow
Continuous Delivery in Java
Abraham Marín-Pérez & Daniel Bryant
Playing Smart: On Games, Intelligence, and Artificial Intelligence
Julian Togelius
Android Programming for Beginners - Second Edition
John Horton
Designing the Internet of Things
Adrian McEwen & Hakim Cassimally
SELinux User's and Administrator's Guide
Mirek Jahoda & Barbora Ančincová & Ioanna Gkioka & Tomáš Čapek
Atomic Habits
James Clear
The 5 AM Club
Robin Sharma
Python Basics
H. Bhasin
Network Security and Cryptography
Sarhan M. Musa
Cloud Computing Basics
T.B. Rehman
Learn Java the Easy Way
Bryson Payne
Practical SQL: A Beginner’s Guide to Storytelling with Data
Anthony DeBarros
3D Printing
Stephanie Torta & Jonathan Torta
3D Character Development Workshop
Erik Van Horn
Software Quality Assurance
Rajiv Chopra
Radar Systems and Radio Aids to Navigation
A.K. Sen & A.B. Bhattacharya
Photoshop Elements 2018
Vickie Ellen Wolper
Data Cleaning
Oswald Campesato
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Hands-On Red Team Tactics
Himanshu Sharma
Hazardous Waste Management
Cliff VanGuilder