The DevOps Career Handbook: The ultimate guide to pursuing a ...
John Knight & Nate Swenson
Selectors, Specificity, and the Cascade: Applying CSS3 to Documents
Eric A. Meyer
Nginx Troubleshooting: Investigate and solve problems with Nginx-powered ...
Alex Kapranoff
Transitions and Animations in CSS: Adding Motion With CSS
Estelle Weyl
Hacking: The Art of Exploitation
Jon Erickson
Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash ...
Shiva V. N. Parasram & Alex Samm & Damian Boodoo & Gerard Johansen & Lee Allen & Tedi Heriyanto & Shakeel Ali
The Art of Cyberwarfare: An Investigator's Guide to Espionage, ...
Jon DiMaggio
Cybersecurity Blue Team Strategies: Uncover the Secrets of Blue ...
Kunal Sehgal & Nikolaos Thymianis
Cybersecurity for Smart Cities: Practices and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Using and Administering Linux: Zero to SysAdmin: Network Services: ...
David Both
Ethical Hacking Workshop: Explore a Practical Approach to Learning ...
Rishalin Pillay & Mohammed Abutheraa
Evading EDR: The Definitive Guide to Defeating Endpoint Detection ...
Matt Hand
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint Bodungen
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner
Bug Bounty From Scratch: A Comprehensive Guide to Discovering ...
Francisco Javier Santiago Vázquez
Learning Kali Linux: Security Testing, Penetration Testing & ...
Ric Messier
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Dolev Farhi & Nick Aleks
Beyond the Invisible Nexus: Dark Web, Dark AI, and Offensive ...
Akashdeep Bhardwaj & Saksham Garg