Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: TCP/IP Illustrated: The Protocols, Volume 1, Author: Kevin Fall
Title: MCA Microsoft Certified Associate Azure Administrator Study Guide: Exam AZ-104, Author: Rithin Skaria
Title: Programming the Internet of Things: An Introduction to Building Integrated, Device-to-Cloud IoT Solutions, Author: Andy King
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things, Author: Fotios Chantzis
Title: Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation, Author: James Forshaw
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam, Author: Ben Piper
Title: Segment Routing for Service Provider and Enterprise Networks, Author: Florian Deragisch
Title: Computer Security Fundamentals, Author: William Easttom II
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: CompTIA Network+ Guide to Networks, Author: Jill West
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Acing the CCNA Exam Volumes 1 & 2, Author: Jeremy McDowell
Title: Applied Embedded Electronics: Design Essentials for Robust Systems, Author: Jerry Twomey

Pagination Links