
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitatio...
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitatio...
Writing for Developers: Blogs that get read Author:by Piotr Sarna (Author), Cynthia Dunlop (Author) Publisher finelybook...
Dynamic Modeling and Neural Network-Based Intelligent Control of Flexible Systems (IEEE Press Series on Control Systems ...
Principles and Applications of Blockchain Systems: How to Overcome the CAP Trilemma in Consortium Blockchain Author:by H...
Recent Advances in Sciences, Engineering, Information Technology & Management Author:by Dinesh Goyal (Editor), Bhan...
Blockchain-Based Digital Twins: Research Trends and Challenges Author:by A. Prasanth (Editor), Vandana Sharma (Editor), ...
Mathematics for Engineers Author:by Francesc Pozo Montero (Author), Núria Parés Mariné (Author), Yolanda Vidal Seguí (Au...
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization Au...
XGBoost for Regression Predictive Modeling and Time Series Analysis: Learn how to build, evaluate, and deploy predictive...
Deep Reinforcement Learning for Reconfigurable Intelligent Surfaces and UAV Empowered Smart 6G Communications (Telecommu...