MonitorDevs Library
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Discover
  • Shelves
  • AI (Public)
  • Android (Public)
  • Backend (Public)
  • C++ (Public)
  • CSS (Public)
  • Cybersecurity (Public)
  • Database (Public)
  • DevOps (Public)
  • Development (Public)
  • Docker - Kubernetes (Public)
  • Frontend (Public)
  • Full Stack (Public)
  • GraphQL (Public)
  • Hacking (Public)
  • IoT (Public)
  • Java (Public)
  • JavaScript (Public)
  • Linux (Public)
  • Nginx (Public)
  • Node.js (Public)
  • Php (Public)
  • Python (Public)
  • React (Public)
  • Skills (Public)
  • TypeScript (Public)

Discover (Random Books)

Continuous Auditing with AI in the Public Sector: Security, Audit and Leadership Series

Continuous Auditing with AI in the Public Sector: Security, ...

Lourens J. Erasmus & Sezer Bozkuş Kahyaoğlu

Working Effectively With Legacy Code

Working Effectively With Legacy Code

Michael C. Feathers

Learn Llinux Shell Scripting: A comprehensive guide to automating administrative tasks with the Bash shell

Learn Llinux Shell Scripting: A comprehensive guide to automating ...

Sebastian Tammer

Advanced Python Programming: Accelerate Your Python Programs Using Proven Techniques and Design Patterns

Advanced Python Programming: Accelerate Your Python Programs ...

Quan Nguyen

Category: Hacking

Hacking MySQL: Breaking, Optimizing and Securing MySQL for Your Use Case

Hacking MySQL: Breaking, Optimizing and Securing MySQL for Your ...

Lukas Vileikis

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Dolev Farhi & Nick Aleks

Bug Bounty From Scratch: A Comprehensive Guide to Discovering Vulnerabilities and Succeeding in Cybersecurity

Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...

Francisco Javier Santiago Vázquez

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Rafay Baloch

Cybersecurity Strategies and Best Practices: A Comprehensive Guide to Mastering Enterprise Cyber Defense Tactics and Techniques

Cybersecurity Strategies and Best Practices: A Comprehensive ...

Milad Aslaner

Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...

Matt Hand

Ethical Hacking Workshop: Explore a Practical Approach to Learning and Applying Ethical Hacking Techniques for Effective Cybersecurity

Ethical Hacking Workshop: Explore a Practical Approach to Learning ...

Rishalin Pillay & Mohammed Abutheraa

The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering: Uncover the secrets behind the ...

Bravo, Cesar & Toska, Desilda & Childress, Rhonda

Cybersecurity for Smart Cities: Practices and Challenges

Cybersecurity for Smart Cities: Practices and Challenges

Mohiuddin Ahmed & Paul Haskell-Dowland

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware and Organized Cybercrime

The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...

Jon DiMaggio

The Hacker Playbook 3: Practical Guide to Penetration Testing

The Hacker Playbook 3: Practical Guide to Penetration Testing

Peter Kim

The Art of Invisibility: The World's Most Famous Hacker Teaches you How to be Safe in the Age of Big Brother and Big Data

The Art of Invisibility: The World's Most Famous Hacker Teaches ...

Kevin Mitnick

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing: Hacking the World's Most Secure ...

Wil Allsopp

Linux for Hackers

Linux for Hackers

Tye Darwin

Book Details

...