MonitorDevs Library
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Discover
  • Shelves
  • AI (Public)
  • Android (Public)
  • Backend (Public)
  • C++ (Public)
  • CSS (Public)
  • Cybersecurity (Public)
  • Database (Public)
  • DevOps (Public)
  • Development (Public)
  • Docker - Kubernetes (Public)
  • Frontend (Public)
  • Full Stack (Public)
  • GraphQL (Public)
  • Hacking (Public)
  • IoT (Public)
  • Java (Public)
  • JavaScript (Public)
  • Linux (Public)
  • Nginx (Public)
  • Node.js (Public)
  • Php (Public)
  • Python (Public)
  • React (Public)
  • Skills (Public)
  • TypeScript (Public)

Discover (Random Books)

JavaScript JSON Cookbook: Over 80 recipes to make the most of JSON in your desktop, server, web and mobile applications

JavaScript JSON Cookbook: Over 80 recipes to make the most of ...

Ray Rischpater

Fullstack Node.js: The Complete Guide to Building Production Apps with Node.js

Fullstack Node.js: The Complete Guide to Building Production ...

David Guttman

Django 4 for the Impatient: Learn the Core Concepts of Python Web Development With Django in One Weekend

Django 4 for the Impatient: Learn the Core Concepts of Python ...

Daniel Correa & Greg LIm

Blockchain, IoT, and AI Technologies for Supply Chain Management: Apply Emerging Technologies to Address and Improve Supply Chain Management

Blockchain, IoT, and AI Technologies for Supply Chain Management: ...

Dr. Veena Grover & Dr. B. Balamurugan Balusamy & Dr. Mariofanna Milanova Dr. A. Yovan Felix

Category: Hacking

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing: Hacking the World's Most Secure ...

Wil Allsopp

The Hacker Playbook 3: Practical Guide to Penetration Testing

The Hacker Playbook 3: Practical Guide to Penetration Testing

Peter Kim

The Art of Invisibility: The World's Most Famous Hacker Teaches you How to be Safe in the Age of Big Brother and Big Data

The Art of Invisibility: The World's Most Famous Hacker Teaches ...

Kevin Mitnick

Linux for Hackers

Linux for Hackers

Tye Darwin

Hacking MySQL: Breaking, Optimizing and Securing MySQL for Your Use Case

Hacking MySQL: Breaking, Optimizing and Securing MySQL for Your ...

Lukas Vileikis

The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering: Uncover the secrets behind the ...

Bravo, Cesar & Toska, Desilda & Childress, Rhonda

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Rafay Baloch

Cybersecurity Strategies and Best Practices: A Comprehensive Guide to Mastering Enterprise Cyber Defense Tactics and Techniques

Cybersecurity Strategies and Best Practices: A Comprehensive ...

Milad Aslaner

Ethical Hacking Workshop: Explore a Practical Approach to Learning and Applying Ethical Hacking Techniques for Effective Cybersecurity

Ethical Hacking Workshop: Explore a Practical Approach to Learning ...

Rishalin Pillay & Mohammed Abutheraa

Cybersecurity for Smart Cities: Practices and Challenges

Cybersecurity for Smart Cities: Practices and Challenges

Mohiuddin Ahmed & Paul Haskell-Dowland

Bug Bounty From Scratch: A Comprehensive Guide to Discovering Vulnerabilities and Succeeding in Cybersecurity

Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...

Francisco Javier Santiago Vázquez

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Dolev Farhi & Nick Aleks

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware and Organized Cybercrime

The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...

Jon DiMaggio

Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...

Matt Hand

Book Details

...