
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitatio...
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitatio...
Tales for Makers: Real-World Projects to Modify, Hack, and Reinvent (Maker Innovations Series) Author:by Enrico Miglino ...
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today’s Crypto Author:by Roger A. Gri...
CMake Best Practices: Upgrade your C++ builds with CMake for maximum efficiency and scalability Author:by Dominik Berner...
The Official Raspberry Pi Beginner’s Guide: How to use your new computer Author:Gareth Halfacree (Author) Publishe...
Boardroom Cybersecurity: A Director’s Guide to Mastering Cybersecurity Fundamentals Author:Dan Weis (Author) ASIN:...
The Code of Honor: Embracing Ethics in Cybersecurity Author: Paul J. Maurer (Author), Ed Skoudis (Author) Publisher fine...
Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles Au...
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency Author: Parmy Olson (Au...
Applied Network Security: Proven tactics to detect and defend against all kinds of network attack Author: Arthur Salmon ...