Szukanie zaawansowane


Okładka: Cyber security kill chain - tactics and strategies. Breaking down the cyberattack process and responding to threats

Okładka: Cyber security kill chain - tactics and strategies. Breaking down the cyberattack process and responding to threats

Okładka: Generative AI with Python and PyTorch. Navigating the AI frontier with LLMs, stable diffusion, and next-gen AI applications. Second edition

Okładka: Generative AI with Python and PyTorch. Navigating the AI frontier with LLMs, stable diffusion, and next-gen AI applications. Second edition

Okładka: Graph machine learning. Learn about the latest advancements in graph data to build robust machine learning models. Second edition

Okładka: Graph machine learning. Learn about the latest advancements in graph data to build robust machine learning models. Second edition

Okładka: Programming neural networks with Python

Okładka: Programming neural networks with Python

Okładka: Reverse engineering Armv8-A systems. A practical guide to kernel, firmware, and TrustZone analysis

Okładka: Reverse engineering Armv8-A systems. A practical guide to kernel, firmware, and TrustZone analysis

Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2012 eZ Systems AS (except where otherwise noted). All rights reserved.