
Metasploit: The Penetration Tester’s Guide, 2nd Edition
Metasploit, 2nd Edition Author(s): David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O’Gor...

Metasploit, 2nd Edition Author(s): David Kennedy (Author), Mati Aharoni (Author), Devon Kearns (Author), Jim O’Gor...

Introduction to Wireless System Design: From Circuits to Web-based Applications Author(s): Henry Lau (Author), Ludy Liu ...

Innovations in Computing Author(s): Sushil Kamboj (Editor), Pardeep Singh Tiwana (Editor) Publisher finelybook 出版社: CR...

AI-Driven Cybersecurity Author(s): Hooman Razavi (Editor), Mariya Ouaissa (Editor), Mariyam Ouaissa (Editor), Haïfa Nako...

Sustainable Resource Management in Next-Generation Computational Constrained Networks (Industry 5.0 Transformation Appli...

Traditional vs Generative AI Pentesting Author: Yassine Maleh (Author) Publisher finelybook 出版社: CRC Press Publication d...

Terahertz Technology in Microwave and Photonics for Effective Communications Author: Prakash Pareek (Author), Naveen Mis...

Improving the Energy Efficiency of Mobile Networks Author:Josip Lorincz (Author), Zvonimir Klarin (Author) Publisher fin...

Kali Linux Wireless Penetration Testing Beginner’s Guide – Third Edition 版本: Master wireless testing techniq...

Technological Applications for Smart Sensors: Intelligent Applications for Real-Time Strategies Author:S. Kannadhasan (A...