85折
-
85折
$1,836Introduction to Computer Organization: Arm Edition -
85折
$1,683Metasploit, 2/e (Paperback) -
85折
$2,125Duckdb: Up and Running: Fast Data Analytics and Reporting -
85折
$1,488Looks Good to Me: Constructive Code Reviews -
85折
$1,938Outlier Detection in Python -
85折
$1,785100 SQL Server Mistakes and How to Avoid Them (Paperback) -
85折
$1,683ASYNC Rust: Unleashing the Power of Fearless Concurrency -
85折
$1,934Powerful Python: Patterns and Strategies with Modern Python -
85折
$1,649Serverless Apps on Cloudflare: Build Solutions, Not Infrastructure -
85折
$2,380Delta Lake: The Definitive Guide: Modern Data Lakehouse Architectures with Data Lakes -
85折
$1,488Collaborative Software Design: How to Facilitate Domain Modeling Decisions -
85折
$1,743Logs and Telemetry: Using Fluent Bit, Kubernetes, Streaming and More (Paperback) -
85折
$1,828Elliptic Curve Cryptography for Developers (Paperback) -
85折
$1,904Learn Haskell by Example -
85折
$1,785Learn Generative AI with Pytorch (Paperback) -
85折
$2,363Aerospike: Up and Running: Developing on a Modern Operational Database for Globally Distributed Apps -
85折
$1,488Lead Developer Career Guide (Paperback) -
85折
$1,785Graph Algorithms the Fun Way: Powerful Algorithms Decoded, Not Oversimplified (Paperback) -
85折
$1,743Starting Data Analytics with Generative AI and Python (Paperback) -
85折
$2,006Terraform Cookbook: Recipes for Codifying Infrastructure (Paperback) -
85折
$1,717Seven Obscure Languages in Seven Weeks: Rediscovering the Tools That Built the Future -
85折
$2,040Financial Data Engineering: Design and Build Data-Driven Financial Products (Paperback) -
85折
$1,785Functional Design and Architecture (Paperback) -
85折
$1,836Cybersecurity Tabletop Exercises: From Planning to Execution -
85折
$1,743Effective C : An Introduction to Professional C Programming, 2/e (Paperback) -
85折
$1,513Learn Ai-Assisted Python Programming, 2/e (Paperback) -
85折
$1,845Scylladb in Action -
85折
$1,743Generative AI in Action -
85折
$1,785Deep Learning with Jax (Paperback) -
85折
$1,870Inside Cyber Warfare: Mapping the Cyber Underworld