Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things, Author: Fotios Chantzis
Title: MCA Microsoft Certified Associate Azure Administrator Study Guide: Exam AZ-104, Author: Rithin Skaria
Title: Cooperative Device-to-Device Communication in Cognitive Radio Cellular Networks, Author: Peng Li
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Cisco IOS Cookbook: Field-Tested Solutions to Cisco Router Problems, Author: Kevin Dooley
Title: Programming the Internet of Things: An Introduction to Building Integrated, Device-to-Cloud IoT Solutions, Author: Andy King
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam, Author: Ben Piper
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation, Author: James Forshaw
Title: Applied Embedded Electronics: Design Essentials for Robust Systems, Author: Jerry Twomey
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam, Author: Gary A. Donahue
Title: Exam Ref AZ-800 Administering Windows Server Hybrid Core Infrastructure, Author: Orin Thomas

Pagination Links