Blockchain, IoT, and AI Technologies for Supply Chain Management: ...
Dr. Veena Grover & Dr. B. Balamurugan Balusamy & Dr. Mariofanna Milanova Dr. A. Yovan Felix
Connected Health Insights for Sustainable Development: Integrating, ...
Shama Siddiqui & Anwar Ahmed Khan & Muazzam Ali Khan Khattak & Raazia Sosan
Docker Deep Dive
Nigel Poulton
Ansible: From Beginner to Pro
Michael Heap
Linux Iptables: Pocket Reference - Firewalls, NAT & Accounting
Gregor N. Purdy
Docker in Action
Jeff Nickoloff
Mastering Kali Linux for Advanced Penetration Testing: Secure ...
Vijay Kumar Velu & Robert Beggs
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash ...
Shiva V. N. Parasram & Alex Samm & Damian Boodoo & Gerard Johansen & Lee Allen & Tedi Heriyanto & Shakeel Ali
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
The Web Application Hacker's Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
The Hacker Playbook 3: Practical Guide to Penetration Testing
Peter Kim
The Art of Invisibility: The World's Most Famous Hacker Teaches ...
Kevin Mitnick
Linux for Hackers
Tye Darwin
Hacking: The Art of Exploitation
Jon Erickson
Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Learning Kali Linux: Security Testing, Penetration Testing & ...
Ric Messier
Artificial Intelligence of Things (AIoT): New Standards, Technologies ...
Kashif Naseer Qureshi & Thomas Newe
Hacking MySQL: Breaking, Optimizing and Securing MySQL for Your ...
Lukas Vileikis
Advanced MySQL 8: Discover the Full Potential of MySQL and Ensure ...
Eric Vanier & Birju Shah & Tejaswi Malepati
Efficient MySQL Performance: Best Practices and Techniques
Daniel Nichter
Artificial Intelligence for Cybersecurity: Develop AI Approaches ...
Bojan Kolosnjaji & Huang Xiao & Peng Xu & Apostolis Zarras
Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive ...
Akashdeep Bhardwaj & Saksham Garg