MonitorDevs Library
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Discover
  • Shelves
  • AI (Public)
  • Android (Public)
  • Backend (Public)
  • C++ (Public)
  • CSS (Public)
  • Cybersecurity (Public)
  • Database (Public)
  • DevOps (Public)
  • Development (Public)
  • Docker - Kubernetes (Public)
  • Frontend (Public)
  • Full Stack (Public)
  • GraphQL (Public)
  • Hacking (Public)
  • IoT (Public)
  • Java (Public)
  • JavaScript (Public)
  • Linux (Public)
  • Nginx (Public)
  • Node.js (Public)
  • Php (Public)
  • Python (Public)
  • React (Public)
  • Skills (Public)
  • TypeScript (Public)

Discover (Random Books)

Effective DevOps: Building a Culture of Collaboration, affinity and Tooling at Scale

Effective DevOps: Building a Culture of Collaboration, affinity ...

Jennifer Davis & Ryn Daniels

TypeScript Design Patterns: Boost your development efficiency by learning about design patterns in TypeScript

TypeScript Design Patterns: Boost your development efficiency ...

Vilic Vane

C++ System Programming Cookbook: Practical Recipes for Linux System-Level Programming Using the Latest C++ Features

C++ System Programming Cookbook: Practical Recipes for Linux ...

Onorato Vaticone

Linux for System Administrators: Navigate the Complex Landscape of the Linux OS and Command Line for Effective Administration

Linux for System Administrators: Navigate the Complex Landscape ...

Viorel Rudareanu & Daniil Baturin

Category: Network Security

Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive Security

Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive ...

Akashdeep Bhardwaj & Saksham Garg

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Dolev Farhi & Nick Aleks

Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing & ...

Ric Messier

Bug Bounty From Scratch: A Comprehensive Guide to Discovering Vulnerabilities and Succeeding in Cybersecurity

Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...

Francisco Javier Santiago Vázquez

Cybersecurity Strategies and Best Practices: A Comprehensive Guide to Mastering Enterprise Cyber Defense Tactics and Techniques

Cybersecurity Strategies and Best Practices: A Comprehensive ...

Milad Aslaner

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...

Clint Bodungen

Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...

Matt Hand

Ethical Hacking Workshop: Explore a Practical Approach to Learning and Applying Ethical Hacking Techniques for Effective Cybersecurity

Ethical Hacking Workshop: Explore a Practical Approach to Learning ...

Rishalin Pillay & Mohammed Abutheraa

Using and Administering Linux: Zero to SysAdmin: Network Services: Volume 3

Using and Administering Linux: Zero to SysAdmin: Network Services: ...

David Both

Cybersecurity for Smart Cities: Practices and Challenges

Cybersecurity for Smart Cities: Practices and Challenges

Mohiuddin Ahmed & Paul Haskell-Dowland

Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue Teams to Combat Cyber Threats in Your Organization

Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...

Kunal Sehgal & Nikolaos Thymianis

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware and Organized Cybercrime

The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...

Jon DiMaggio

Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools

Kali Linux 2018: Assuring Security by Penetration Testing: Unleash ...

Shiva V. N. Parasram & Alex Samm & Damian Boodoo & Gerard Johansen & Lee Allen & Tedi Heriyanto & Shakeel Ali

Nmap: Network Exploration and Security Auditing Cookbook

Nmap: Network Exploration and Security Auditing Cookbook

Paulino Calderon

Hacking: The Art of Exploitation

Hacking: The Art of Exploitation

Jon Erickson

Book Details

...