Toggle Navigation
Calibre-Web
Search
Search
Advanced Search
Guest
Browse
Books
Shelves
Advanced Search
Book Title
Author
Publisher
Published Date From
Published Date To
Read Status
Any
Empty
Yes
No
Tags
1843
A Guide to the National Institute of Standards and Technology Risk Management Framework
A Key to Collaborative Security
A WhiteHat Perspective
Algorithms
and deployment of containerized applications.
and technology
BACJoOSA23k
bicycles
Bikes
Biographical
but also for the preservation of our beautiful planet and all its inhabitants.
Chronicle Books LLC
COM000000 - COMPUTERS / General
COM006000 - COMPUTERS / Buyer
COM011000 - COMPUTERS / Systems Architecture / General
COM014000 - COMPUTERS / Computer Science
COM015000 - COMPUTERS / Security / Viruses & Malware
COM015000 - COMPUTERS / Security / Viruses and Malware
COM017000 - COMPUTERS / Cybernetics
COM019000 - COMPUTERS / System Administration / Disaster and Recovery
COM030000 - COMPUTERS / System Administration / Storage and Retrieval
COM032000 - COMPUTERS / Information Technology
COM043000 - COMPUTERS / Networking / General
COM043040 - COMPUTERS / Networking / Network Protocols
COM043050 - COMPUTERS / Security / Networking
COM046000 - COMPUTERS / Operating Systems / General
COM046030 - COMPUTERS / Operating Systems / UNIX
COM046050 - COMPUTERS / Operating Systems / Windows Server
COM046070 - COMPUTERS / Operating Systems / Linux
COM048000 - COMPUTERS / Systems Architecture / Distributed Systems and Computing
COM051360 - COMPUTERS / Programming Languages / Python
COM051430 - COMPUTERS / Software Development & Engineering / Project Management
COM051440 - COMPUTERS / Software Development and Engineering / Tools
COM053000 - COMPUTERS / Security / General
COM055000 - COMPUTERS / Certification Guides / General
COM060040 - COMPUTERS / Security / Online Safety and Privacy
COM060160 - COMPUTERS / Web / Web Programming
COM060180 - COMPUTERS / Web / Web Services and APIs
COM074000 - COMPUTERS / Hardware / Mobile Devices
COM079000 - COMPUTERS / Social Aspects / General
COM082000 - COMPUTERS / Bioinformatics
COM083000 - COMPUTERS / Security / Cryptography
COM088000 - COMPUTERS / System Administration / General
COM088010 - COMPUTERS / System Administration / Linux & UNIX Administration
COM088010 - COMPUTERS / System Administration / Linux and UNIX Administration
COM088020 - COMPUTERS / System Administration / Windows Administration
COM091000 - COMPUTERS / Cloud Computing
Comedies
Computers
COMPUTERS / Computer Science
COMPUTERS / General
COMPUTERS / Internet / Security
COMPUTERS / Machine Theory
COMPUTERS / Mathematical & Statistical Software
COMPUTERS / Natural Language Processing
COMPUTERS / Networking / General
COMPUTERS / Networking / Network Protocols
COMPUTERS / Operating Systems / Linux
COMPUTERS / Operating Systems / UNIX
COMPUTERS / Programming / General
COMPUTERS / Programming / Microsoft
COMPUTERS / Programming Languages / General
COMPUTERS / Programming Languages / Java
COMPUTERS / Programming Languages / JavaScript
COMPUTERS / Programming Languages / LISP
COMPUTERS / Security / General
COMPUTERS / Web / Web Programming
DACxRYvPj9M
DADY7YknvOo
Deliver continuous business value through people
Design
Designing Smart Homes
Distributed Systems & Computing
Drama
Fantastique
feminisim
Fiction
Fixed Layout
From Requirements to Reality
futurism; world's fair; futurama; utopia; science fiction; design; internet history; imagination
Games & Activities
General
How Hackers Do What They Do and How to Protect against It
information retrieval
information society
Information Technology
Information Theory
Internet
introduction artificial intelligence; artificial intelligence; computer artificial intelligence; expert systems and artificial intelligence; deep learning artificial intelligence; computers; deep learning; technology; semantics; rule-based approach; ALPAC report; parallel corpora; paradigm; statistic; segment-based approach; linguistics; manual; automatic; Babelfish; comprehension; computer science; language diversity; reasoning; cognitive science; turing test; automatic dialoguing system; Eliza system; Weizenbaum; ambiguity; robots and artificial intelligence; applied artificial intelligence
jdr
King kong théorie
Lesbian
LGBT
library and information science
Linux
Linux & UNIX Administration
LIS
longreads
math
News
not only for optimal health and performance
Operating Systems
oregon
philosophy
portland
process
Programming
Role Playing & Fantasy
scaling
Smart Homes
Social Aspects
Software Development & Engineering
Solving the Problems in Information Risk Management
sprockette
statistics
Staying Safe in a Digital World
System Administration
Systems Architecture
The Crisis in Online Privacy and Security
The Economist
This guide was created so that you can make health-conscious eating choices and to guide you to plant based whole foods
Use Azure Kubernetes Service to automate management
Vegan Fitness Bundle
Web
which I strongly believe is the best way for human beings to eat
women
zine
Exclude Tags
1843
A Guide to the National Institute of Standards and Technology Risk Management Framework
A Key to Collaborative Security
A WhiteHat Perspective
Algorithms
and deployment of containerized applications.
and technology
BACJoOSA23k
bicycles
Bikes
Biographical
but also for the preservation of our beautiful planet and all its inhabitants.
Chronicle Books LLC
COM000000 - COMPUTERS / General
COM006000 - COMPUTERS / Buyer
COM011000 - COMPUTERS / Systems Architecture / General
COM014000 - COMPUTERS / Computer Science
COM015000 - COMPUTERS / Security / Viruses & Malware
COM015000 - COMPUTERS / Security / Viruses and Malware
COM017000 - COMPUTERS / Cybernetics
COM019000 - COMPUTERS / System Administration / Disaster and Recovery
COM030000 - COMPUTERS / System Administration / Storage and Retrieval
COM032000 - COMPUTERS / Information Technology
COM043000 - COMPUTERS / Networking / General
COM043040 - COMPUTERS / Networking / Network Protocols
COM043050 - COMPUTERS / Security / Networking
COM046000 - COMPUTERS / Operating Systems / General
COM046030 - COMPUTERS / Operating Systems / UNIX
COM046050 - COMPUTERS / Operating Systems / Windows Server
COM046070 - COMPUTERS / Operating Systems / Linux
COM048000 - COMPUTERS / Systems Architecture / Distributed Systems and Computing
COM051360 - COMPUTERS / Programming Languages / Python
COM051430 - COMPUTERS / Software Development & Engineering / Project Management
COM051440 - COMPUTERS / Software Development and Engineering / Tools
COM053000 - COMPUTERS / Security / General
COM055000 - COMPUTERS / Certification Guides / General
COM060040 - COMPUTERS / Security / Online Safety and Privacy
COM060160 - COMPUTERS / Web / Web Programming
COM060180 - COMPUTERS / Web / Web Services and APIs
COM074000 - COMPUTERS / Hardware / Mobile Devices
COM079000 - COMPUTERS / Social Aspects / General
COM082000 - COMPUTERS / Bioinformatics
COM083000 - COMPUTERS / Security / Cryptography
COM088000 - COMPUTERS / System Administration / General
COM088010 - COMPUTERS / System Administration / Linux & UNIX Administration
COM088010 - COMPUTERS / System Administration / Linux and UNIX Administration
COM088020 - COMPUTERS / System Administration / Windows Administration
COM091000 - COMPUTERS / Cloud Computing
Comedies
Computers
COMPUTERS / Computer Science
COMPUTERS / General
COMPUTERS / Internet / Security
COMPUTERS / Machine Theory
COMPUTERS / Mathematical & Statistical Software
COMPUTERS / Natural Language Processing
COMPUTERS / Networking / General
COMPUTERS / Networking / Network Protocols
COMPUTERS / Operating Systems / Linux
COMPUTERS / Operating Systems / UNIX
COMPUTERS / Programming / General
COMPUTERS / Programming / Microsoft
COMPUTERS / Programming Languages / General
COMPUTERS / Programming Languages / Java
COMPUTERS / Programming Languages / JavaScript
COMPUTERS / Programming Languages / LISP
COMPUTERS / Security / General
COMPUTERS / Web / Web Programming
DACxRYvPj9M
DADY7YknvOo
Deliver continuous business value through people
Design
Designing Smart Homes
Distributed Systems & Computing
Drama
Fantastique
feminisim
Fiction
Fixed Layout
From Requirements to Reality
futurism; world's fair; futurama; utopia; science fiction; design; internet history; imagination
Games & Activities
General
How Hackers Do What They Do and How to Protect against It
information retrieval
information society
Information Technology
Information Theory
Internet
introduction artificial intelligence; artificial intelligence; computer artificial intelligence; expert systems and artificial intelligence; deep learning artificial intelligence; computers; deep learning; technology; semantics; rule-based approach; ALPAC report; parallel corpora; paradigm; statistic; segment-based approach; linguistics; manual; automatic; Babelfish; comprehension; computer science; language diversity; reasoning; cognitive science; turing test; automatic dialoguing system; Eliza system; Weizenbaum; ambiguity; robots and artificial intelligence; applied artificial intelligence
jdr
King kong théorie
Lesbian
LGBT
library and information science
Linux
Linux & UNIX Administration
LIS
longreads
math
News
not only for optimal health and performance
Operating Systems
oregon
philosophy
portland
process
Programming
Role Playing & Fantasy
scaling
Smart Homes
Social Aspects
Software Development & Engineering
Solving the Problems in Information Risk Management
sprockette
statistics
Staying Safe in a Digital World
System Administration
Systems Architecture
The Crisis in Online Privacy and Security
The Economist
This guide was created so that you can make health-conscious eating choices and to guide you to plant based whole foods
Use Azure Kubernetes Service to automate management
Vegan Fitness Bundle
Web
which I strongly believe is the best way for human beings to eat
women
zine
Series
Bikes in Space
Exclude Series
Bikes in Space
Shelves
Exclude Shelves
Languages
Bengali
English
French
Exclude Languages
Bengali
English
French
Extensions
AZW
AZW3
EPUB
KFX
MOBI
PDF
Exclude Extensions
AZW
AZW3
EPUB
KFX
MOBI
PDF
Rating Above
Rating Below
Description
Search
×
Book Details
...