Metasploit: The Penetration Tester’s Guide, 2nd Edition
Metasploit, 2nd Edition Author: David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O’Gorman...
Metasploit, 2nd Edition Author: David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O’Gorman...
Customizing and Extending SharePoint Online: Design tailor-made solutions with modern SharePoint features to meet your o...
Building Secure Automotive IoT Applications: Developing robust IoT solutions for next-gen automotive software Author: Dr...
AI Revealed: Theory • Applications • Ethics (MLI Generative AI Series) Author: Erik L. Herman (Author) Publisher finelyb...
Quantum Computing: A Journey into the Next Frontier of Information and Communication Security Author: Mohammad Hammoudeh...
Data Mesh: Principles, patterns, architecture, and strategies for data-driven decision making (English Edition) Author: ...
C# 12 for Cloud, Web, and Desktop Applications: Modern concepts and techniques for software development with C# 12 (Engl...
Spatial Data Science: With Applications in R (Chapman & Hall/CRC The R Series) Author: Edzer Pebesma (Author), Roge...
Mastering the Java Virtual Machine: An in-depth guide to JVM internals and performance optimization Author: Otàvio Santa...
Secure Big-data Analytics for Emerging Healthcare in 5G and Beyond: Concepts, paradigms, and solutions (Healthcare Techn...