Why Data Science Projects Fail: The Harsh Realities of Implementing ...
Douglas Gray & Evan Shellshear
Linux Iptables: Pocket Reference - Firewalls, NAT & Accounting
Gregor N. Purdy
The Web Application Hacker's Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Modern Full-Stack Development: Using TypeScript, React, Node.js, ...
Frank Zammetti
The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...
Jon DiMaggio
Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive ...
Akashdeep Bhardwaj & Saksham Garg
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Dolev Farhi & Nick Aleks
Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...
Francisco Javier Santiago Vázquez
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint Bodungen
Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
Cybersecurity for Smart Cities: Practices and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Ethical Hacking Workshop: Explore a Practical Approach to Learning ...
Rishalin Pillay & Mohammed Abutheraa
Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...
Matt Hand
Hacking: The Art of Exploitation
Jon Erickson
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash ...
Shiva V. N. Parasram & Alex Samm & Damian Boodoo & Gerard Johansen & Lee Allen & Tedi Heriyanto & Shakeel Ali
Learning Kali Linux: Security Testing, Penetration Testing & ...
Ric Messier
Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Using and Administering Linux: Zero to SysAdmin: Network Services: ...
David Both