Expand menu
Categorias
Todos Importados de Computação, Informática e Mídias Digitais
Importados de Análise de Sistemas e Design
Importados de Base de dados
Todos
Importados de Bases de Dados Oracle
Importados de Bases de Dados SQL
Importados de Design Gráfico
Todos
Importados de Editoração Eletrônica
Importados de Gráficos da Web
Importados de Hardware
Todos
Importados de Arquitetura de Sistemas
Importados de Dispositivos Móveis
Importados de Mac Hardware
Importados de Mainframes e minicomputadores
Importados de Periféricos de hardware
Importados de Tecnologia Pessoal
Importados de Microsoft
Todos
Importados de Microsoft Windows
Importados de Programação de Computadores
Todos
Importados de Ada Programação
Importados de Algoritmos e Programação
Importados de C e C Programação
Importados de Design de software
Importados de Programação de Jogo de Computadores
Importados de Programação em Java
Importados de Programação em Javascript
Importados de Programação Html
Importados de Programação LISP
Importados de Programação Orientação por Objetos
Importados de Programação Paralela
Importados de Programação PHP
Importados de Programação Python
Importados de Programação Rubi
Importados de Programação XML
Importados de Redes de Informáticas
Todos
Importados de Redes , Protocolos e APIs
Importados de Sistemas Cliente-Servidor
Importados de Sistemas Operacionais
Todos
Importados de Gestão de Sistemas
Importados de MacOS Sistemas Operacionais
Importados de Sistemas Operacionais Linux
Importados de Sistemas Operacionais UNIX
Importados de Software em Informática e Tecnologia
Todos
Importados de Software de Finanças Pessoais
Importados de Software de Negócios
Importados de Web Design
Importados de Web Marketing
Home
Importados de Análise de Sistemas e Design
Home
Livros
Inglês e Outras Línguas
Importados de Computação, Informática e Mídias Digitais
Importados de Análise de Sistemas e Design
Importados de Análise de Sistemas e Design
293 registros
4 / 5
Data Privacy: A Runbook for Engineers
Detalhes
Command-Line Rust: A Project-Based Primer for Writing Rust Clis
Detalhes
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineer
Detalhes
Social Media Investigation for Law Enforcement
Detalhes
The Art of Capacity Planning 2e
Detalhes
Seguridad en Sistemas Operativos Windows y Linux. 2ª Edición actualizada
Detalhes
The Age of AI: And Our Human Future
Detalhes
Simplifying Hybrid Cloud Adoption with AWS: Realize edge computing and build compelling hybrid solut
Detalhes
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition: Master wireless testing t
Detalhes
The Complete Coding Interview Guide in Java: An effective guide for aspiring Java developers to ace
Detalhes
Design It!: From Programmer to Software Architect
Detalhes
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Se
Detalhes
Devops Tools for Java Developers: Best Practices from Source Code to Production Containers
Detalhes
Enterprise Model Patterns: Describing the World (UML Version)
Detalhes
Information: A Very Short Introduction (Very Short Introductions) (English Edition)
Detalhes
The Data Warehouse Lifecycle Toolkit
Detalhes
Production Kubernetes: Building Successful Application Platforms
Detalhes
Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level
Detalhes
Solving Identity Management in Modern Applications: Demystifying Oauth 2, Openid Connect, and Saml 2
Detalhes
Computer Engineering and Technology: 23rd Ccf Conference, Nccet 2019, Enshi, China, August 1-2, 2019
Detalhes
Ciberleviatán: El colapso de la democracia liberal frente a la revolución digital (Spanish Edition)
Detalhes
Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets
Detalhes
Historias de usuario: Una visión pragmática (Spanish Edition)
Detalhes
THE KUBERNETES BIBLE: The definitive guide to deploying and managing Kubernetes across major cloud p
Detalhes
Spring Batch in Action
Detalhes
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Kri
Detalhes
Cucumber Recipes: Automate Anything with BDD Tools and Techniques
Detalhes
El diseño del mundo: ¿Cómo se crea una experiencia?
Detalhes
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies
Detalhes
The Takedown: A fun enemies-to-lovers, fake-dating spy romcom (English Edition)
Detalhes
Isse/Secure 2007 Securing Electronic Business Processes: Highlights of the Information Security Solu
Detalhes
Solutions Architect's Handbook - Second Edition: Kick-start your career as a solutions architect by
Detalhes
Orchestrating Experiences: Collaborative Design for Complexity
Detalhes
Information Security Policies, Procedures, and Standards: A Practitioner's Reference
Detalhes
Your Code As A Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design i
Detalhes
Industry Unbound: The Inside Story of Privacy, Data, and Corporate Power
Detalhes
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Ot
Detalhes
Mastering Microservices with Java - Third Edition: Build enterprise microservices with Spring Boot 2
Detalhes
Introduction to Machine Learning, Fourth Edition
Detalhes
Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments
Detalhes
The Sketchnote Handbook Video Edition: The Illustrated Guide to Visual Note Taking
Detalhes
Technical Program Manager's Handbook: Empowering managers to efficiently manage technical projects
Detalhes
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Detalhes
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Detalhes
Reliable Software Technologies - Ada-Europe 2001
Detalhes
Persistence Best Practices for Java Applications: Effective strategies for distributed cloud-native
Detalhes
Software Requirements
Detalhes
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tes
Detalhes
Observing the User Experience: A Practitioner's Guide to User Research
Detalhes
C++ Software Design: Design Principles and Patterns for High-Quality Software
Detalhes
Designing Software Architectures: A Practical Approach
Detalhes
The Masters of Deception: Gang That Ruled Cyberspace, the
Harper Perennial Língua: Inglês
Detalhes
Nginx Unit Cookbook: Recipes for Using a Versatile Open Source Server
Detalhes
Sre with Java Microservices: Patterns for Reliable Microservices in the Enterprise
Detalhes
Hybrid Cloud Infrastructure and Operations Explained: Accelerate your application migration and mode
Detalhes
Object-Oriented Modeling and Design: United States Edition
136298419 inglês capa dura
Detalhes
Write Great Code, Volume 3: Engineering Software
Detalhes
Algorithms in C, Part 5: Graph Algorithms
Detalhes
Specification by Example: How Successful Teams Deliver the Right Software
Detalhes
System Design Interview: The Ultimate Guide to Master All the Fundamentals of System Design & to Get
Detalhes
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Detalhes
Fraud Investigation and Forensic Accounting in the Real World
Detalhes
Artificial Intelligence for Autonomous Networks
Detalhes
Docker in Action
Detalhes
The Politics and Policies of Big Data: Big Data, Big Brother?
Detalhes
Salesforce Anti-Patterns: Create powerful Salesforce architectures by learning from common mistakes
Detalhes
PYTHON PROGRAMMING FOR BEGINNERS: The New Complete Programming Guide To Easily Learn Python Coding F
Detalhes
Identity and Access Management: Business Performance Through Connected Intelligence
Detalhes
Chaos Engineering: Site Reliability Through Controlled Disruption
Detalhes
Testing Elixir: Effective and Robust Testing for Elixir and Its Ecosystem
Detalhes
Zero Trust Security: An Enterprise Guide
Detalhes
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace
Detalhes
Resultado: [ 217 a 288 ] num total de [ 293 ] registros.
Início
Anterior
2
3
4
(atual)
5
Próximo
Último
Deseja Realmente Sair?
Clique em
"Sair"
para encerrar essa sessão.
Deseja Realmente Sair?
×
Clique em "Sair" para encerrar essa sessão.
Home
Menu
Busca
Topo