
Metasploit: The Penetration Tester’s Guide, 2nd Edition
Metasploit, 2nd Edition Author:David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O'Gorman (Autho...

Metasploit, 2nd Edition Author:David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O'Gorman (Autho...

Learn Penetration Testing with Python 3.x: An ethical hacker’s blueprint for offensive security - 2nd Edition Author:Yeh...

Evolutionary Large-Scale Multi-Objective Optimization and Applications Author:Xingyi Zhang (Author), Ran Cheng (Author),...

AI and the Boardroom: Insights into Governance, Strategy, and the Responsible Adoption of AI Author:Rohan Sharma (Author...

Explainable Artificial Intelligence for Trustworthy Internet of Things (Computing and Networks) Author:Mohamed Abdel-Bas...

AWS Certified Developer Associate Certification and Beyond: A comprehensive guide to help you succeed in the AWS DVA-C02...

Linux Pocket Guide: Essential Commands Author:Daniel J. Barrett (Author) Publisher finelybook 出版社:O'Reilly Media Editio...

Microsoft Azure Fundamentals Certification and Beyond - Second Edition 版次: A complete AZ-900 exam guide with online mock...

Realizing the Metaverse: A Communications and Networking Perspective Author:Wei Yang Bryan Lim (Editor), Zehui Xiong (Ed...

Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies) Author:Prabh Deep ...