
Attacking Network Protocols: A Hacker’s Guide to Capture,Analysis,and Exploitation
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Author:James Forshaw (Author) ASIN:...

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Author:James Forshaw (Author) ASIN:...

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners Author:Sam Grubb (Author) Publisher: No Starch Pres...

Cybersecurity Essentials Author:Charles J. Brooks (Author), Christopher Grow (Author), Philip A. Craig Jr. (Author), Don...

An Invitation to Real Analysis (Textbooks in Mathematics) Author:Andrew D. Hwang (Author) Publisher: Chapman and Hall/CR...

AI Agents and Applications: With LangChain, LangGraph, and MCP Author:Roberto Infante (Author) Publisher: Manning Public...

GIS Cartography: A Guide to Effective Map Design Author:Gretchen N. Peterson (Author) Publisher: CRC Press Publication d...

Smart Cyber-Physical Systems (Computational and Intelligent Systems) Author:Ramesh Chandra Poonia (Author), Kamal Upreti...

AI, Cybersecurity and Data Science for Drone and Unmanned Aerial Vehicles Author:Shishir Kumar Shandilya (Author), Ferna...

Machine Learning: Architecture in the age of Artificial Intelligence Author:Phil Bernstein (Author) Publisher: RIBA Publ...

Ultimate Certified Kubernetes Security Specialist (CKS) Certification Guide: Secure Kubernetes Clusters, Harden Applicat...