Kubernetes Best Practices: Blueprints for Building Successful ...
Lachlan Evenson & Brendan Burns & Eddie Villalba & Dave Strebel
Analytics for the Internet of Things (IoT): Intelligent Analytics ...
Andrew Minteer
MySQL Crash Course: A Hands-On Introduction to Database Development
Rick Silva
IoT and Analytics in Renewable Energy Systems - Volume I: Sustainable ...
O. V. Gnana Swathika, K. Karthikeyan; Sanjeevikumar Padmanaban
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash ...
Shiva V. N. Parasram & Alex Samm & Damian Boodoo & Gerard Johansen & Lee Allen & Tedi Heriyanto & Shakeel Ali
Hacking: The Art of Exploitation
Jon Erickson
Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Learning Kali Linux: Security Testing, Penetration Testing & ...
Ric Messier
Using and Administering Linux: Zero to SysAdmin: Network Services: ...
David Both
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Ethical Hacking Workshop: Explore a Practical Approach to Learning ...
Rishalin Pillay & Mohammed Abutheraa
Cybersecurity for Smart Cities: Practices and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...
Francisco Javier Santiago Vázquez
Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint Bodungen
Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive ...
Akashdeep Bhardwaj & Saksham Garg
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Dolev Farhi & Nick Aleks
The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...
Jon DiMaggio
Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...
Matt Hand