Building Forms with Vuejs: Patterns for building and scaling ...
Marina Mosti
PostgreSQL Up & Running: A Practical Guide to the Advanced Open ...
Regina Obe & Leo Hsu
Generative AI for Cybersecurity: Fundamentals, Applications, ...
Diep N. Nguyen & Ly Vu & Quang Uy Nguyen & Dinh Thai Hoang
TypeScript 4 Design Patterns and Best Practices: Discover Effective ...
Theo Despoudis
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash ...
Shiva V. N. Parasram & Alex Samm & Damian Boodoo & Gerard Johansen & Lee Allen & Tedi Heriyanto & Shakeel Ali
Hacking: The Art of Exploitation
Jon Erickson
Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Learning Kali Linux: Security Testing, Penetration Testing & ...
Ric Messier
Using and Administering Linux: Zero to SysAdmin: Network Services: ...
David Both
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Ethical Hacking Workshop: Explore a Practical Approach to Learning ...
Rishalin Pillay & Mohammed Abutheraa
Cybersecurity for Smart Cities: Practices and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...
Francisco Javier Santiago Vázquez
Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint Bodungen
Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive ...
Akashdeep Bhardwaj & Saksham Garg
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Dolev Farhi & Nick Aleks
The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...
Jon DiMaggio
Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...
Matt Hand