Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: MCA Microsoft Certified Associate Azure Administrator Study Guide: Exam AZ-104, Author: Rithin Skaria
Title: Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things, Author: Fotios Chantzis
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Programming the Internet of Things: An Introduction to Building Integrated, Device-to-Cloud IoT Solutions, Author: Andrew King
Title: CompTIA Network+ N10-009 Cert Guide, Author: Anthony Sequeira
Title: (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: AWS Certified Machine Learning Study Guide: Specialty (MLS-C01) Exam, Author: Shreyas Subramanian
Title: Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers, Author: Peter Druschel
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Certified CMMC Assessor Handbook: Developed by CyberDI, Author: J. Gregory Mcverry
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, Author: Stephen Sims
Title: Applied Embedded Electronics: Design Essentials for Robust Systems, Author: Jerry Twomey
Title: The Stack: On Software and Sovereignty, Author: Benjamin H. Bratton
Title: Guide to Operating Systems, Author: Greg Tomsho

Pagination Links