FORTIFY - A GUIDE TO COMPUTER SECURITY
From Tokenization to Transformers: A Complete Guide to Large Language Models
Fundamentals of Microprocessor
Funnelize Your Business: A proven method for scaling your business
Generic Algorithms and Data Structures using C++11
Get Set Hack (An Ethical Hacking Guide)
Getting Started with Java using BlueJ
Girlfriend and other short stories
Globalization and Integrated Program Compiler