Hacking
Christophe Foulon, Ken Underhill, Tia Hopkins
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber,...
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber,...
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber,...
Mohammed A. Imran, Srinivasa Rao Kotipalli
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
Jason Tyler (Author), Will Verduzco (Contributor)
Carlos A. Lozano , Dhruv Shah, Riyaz...
Carlos A. Lozano , Dhruv Shah, Riyaz...
Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr...
Himanshu Sharma, Joe Marshall
Himanshu Sharma, Joe Marshall
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
Samuel Bowne
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
Samuel Bowne
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
Samuel Bowne
Dr. Erdal Ozkaya, Milad Aslaner
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
Sion Retzkin
Chandra Sekhar Nayak, Rivu Chakraborty