Books

Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Machine Learning Using R Machine Learning Using R
2016
Purnam Purnam
2022
Building an Enterprise Chatbot Building an Enterprise Chatbot
2019
Firewall Policies and VPN Configurations Firewall Policies and VPN Configurations
2006
Relativistic and Non-Relativistic Quantum Mechanics Relativistic and Non-Relativistic Quantum Mechanics
2023