Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Technology Strategy Patterns

Technology Strategy Patterns

Eben Hewitt

Cloud Native Infrastructure

Cloud Native Infrastructure

Justin Garrison & Kris Nova

Inside Cyber Warfare

Inside Cyber Warfare

Jeffrey Caruso

Privileged Attack Vectors

Privileged Attack Vectors

Morey J. Haber

Category: linux

Hands-On AWS Penetration Testing with Kali Linux

Hands-On AWS Penetration Testing with Kali Linux

Karl Gilbert & Benjamin Caudill

Kali Linux - An Ethical Hacker's Cookbook

Kali Linux - An Ethical Hacker's Cookbook

Himanshu Sharma

Kali Linux Assuring Security by Penetration Testing, Fourth Edition

Kali Linux Assuring Security by Penetration Testing, Fourth ...

Shiva V. N Parasram

Kali Linux Web Penetration Testing Cookbook, Second Edition

Kali Linux Web Penetration Testing Cookbook, Second Edition

Gilberto Najera-Gutierrez

The Linux Command Line: A Complete Introduction, 2nd Edition

The Linux Command Line: A Complete Introduction, 2nd Edition

William Shotts

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Vijay Kumar Velu

Mastering Linux Security and Hardening, Second Edition

Mastering Linux Security and Hardening, Second Edition

Donald A. Tevault

Metasploit for Beginners

Metasploit for Beginners

Sagar Rahalkar

Metasploit Penetration Testing Cookbook - Third Edition

Metasploit Penetration Testing Cookbook - Third Edition

Daniel Teixeira

Book Details

...