
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitatio...

Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitatio...

Emerging Cyber Threats and Cognitive Vulnerabilities Author:by Vladlena Benson PhD MSc BSc CISMP SFHEA (Editor), John Mc...

Petri Nets: Theoretical Models and Analysis Methods for Concurrent Systems Author:by Guanjun Liu (Author) Publisher:Spr...

Communication Protocol Engineering Author:by Miroslav Popovic (Author) Publisher:CRC Press Edition:2nd edition Publica...

From Code to Chip: Open-Source Automated Analog Layout Design (Synthesis Lectures on Engineering, Science, and Technolog...

Encyclopedia of Cryptography, Security and Privacy Author:by Sushil Jajodia (Editor), Pierangela Samarati (Editor), Moti...

5G Fixed Wireless Access: Revolutionizing Connectivity in the Digital Age (Synthesis Lectures on Communications) Author:...

Introduction to Enumerative and Analytic Combinatorics (Discrete Mathematics and Its Applications) Author:by Miklos Bona...

Microsoft 365 Word For Dummies Author:by Dan Gookin (Author) Publisher:For Dummies Edition:2nd edition Publication Dat...

Microsoft Copilot For Dummies Author:by Chris Minnick (Author) Publisher:For Dummies Edition:1st edition Publication D...