
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...

Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...

IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing Author:by Lewis Heuermann (Author) Pu...

Core Java, Volume II: Advanced Features (Oracle Press for Java) Author:by Cay Horstmann (Author) Publisher finelybook 出版...

Wireless Communications: From Fundamentals to Beyond 5G (IEEE Press) Author:by Andreas F. Molisch (Author) Publisher fin...

Bash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance your penetration testing wo...

CCNP SPCOR 350-501 Official Cert Guide Author:by Brad Riapolov (Author), Mohammad Said Khalil (Author) Publisher finelyb...

The Analysis and Design of Linear Circuits Author:by Roland E. Thomas (Author), Albert J. Rosa (Author), Gregory J. Tous...

CCNA Certification Study Guide Volume 1: Exam 200-301 v1.1 (Sybex Study Guide) Author:by Todd Lammle (Author), Donald Ro...

CCNA Certification Study Guide Volume 2: Exam 200-301 v1.1 (Sybex Study Guide) Author:by Todd Lammle (Author), Donald Ro...

Artificial Intelligence (AI) in Forensic Sciences (Forensic Science in Focus) Author:by Zeno Geradts (Editor), Katrin Fr...