8折
-
80折
$1,320Apache Spark 2.x Cookbook -
80折
$1,088Building Bots with Microsoft Bot Framework -
80折
$816Jump Start Responsive Web Design: Modern Dynamic Responsive Solutions -
80折
$2,704Security Operations Center Guidebook: A Practical Guide for a Successful SOC -
80折
$1,400MCSA 70-741 Cert Guide: Networking with Windows Server 2016 (Certification Guide) -
80折
$1,320Raspberry Pi Supercomputing and Scientific Programming: MPI4PY, NumPy, and SciPy for Enthusiasts -
80折
$3,400Cognitive Approach to Natural Language Processing -
80折
$7923D Printing For Dummies (For Dummies (Computers)) -
80折
$1,584Oracle Database 12c Release 2 In-Memory: Tips and Techniques for Maximum Performance (Oracle Press) -
80折
$792Social Media Marketing All-in-One For Dummies (For Dummies (Computers)) -
80折
$1,056Coding All-in-One For Dummies (For Dummies (Computers)) -
80折
$1,320SPSS Statistics for Data Analysis and Visualization -
80折
$1,320Mastering Java for Data Science -
80折
$1,088D3.js 4.x Data Visualization, 3/e (Paperback) -
80折
$1,184Learning Apache Cassandra Second Edition -
80折
$1,264Monitoring with Graphite (Paperback) -
80折
$1,680Machine Dreaming and Consciousness -
80折
$2,208Deep Learning with Python: A Hands-on Introduction -
80折
$1,716Creating Strategic Value through Financial Technology (Wiley Finance) -
80折
$960Learn Ionic 2: Develop Multi-platform Mobile Apps -
80折
$1,104Introducing Erlang: Getting Started in Functional Programming -
80折
$1,848Usage-Driven Database Design: From Logical Data Modeling through Physical Schema Definition -
80折
$1,400Hadoop in 24 Hours, Sams Teach Yourself -
80折
$1,840Oracle SQL Tuning with Oracle SQLTXPLAIN: Oracle Database 12c Edition -
80折
$2,720Emotions and Affect in Human Factors and Human-Computer Interaction -
80折
$1,056CCNA Routing and Switching Practice Tests: Exam 100-105, Exam 200-105, and Exam 200-125 -
80折
$1,320Windows 10 Anniversary Update Bible -
80折
$1,260Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS -
80折
$960Troubleshooting OpenVPN -
80折
$1,584Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework