Інше

Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Aaron Woody

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway

Hacking Android. Click here to enter text

Mohammed A. Imran, Srinivasa Rao Kotipalli

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core

Sean Burns