Black Hat Python: Python Programming for Hackers and Pentesters,2nd Edition
Black Hat Python: Python Programming for Hackers and Pentesters,2nd Edition by: Justin Seitz ,Tim Arnold Publisher finel...
Black Hat Python: Python Programming for Hackers and Pentesters,2nd Edition by: Justin Seitz ,Tim Arnold Publisher finel...
Terraform for Developers: Essentials of Infrastructure Automation and Provisioning Author: Kimiko Lee (Author) Publisher...
A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program Author: Debra Bake...
IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications Author: Samayveer Singh ...
Exploring Operations Research with R (Chapman & Hall/CRC Series in Operations Research) Author: Jim Duggan (Author)...
Zero Trust Networks: Building Secure Systems in Untrusted Networks Author: Razi Rais (Author), Christina Morillo (Author...
Linux Pocket Guide: Essential Commands Author: Daniel J. Barrett (Author) Publisher finelybook 出版社: O’Reilly Media...
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning ...
Intelligence-Driven Incident Response: Outwitting the Adversary Author: Rebekah Brown (Author), Scott Roberts (Author) P...
Information Technology Security and Risk Management Author: Stephen C. Wingreen (Editor), Amelia Samandari (Editor) Edit...