Hacking
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
Mohit Raj
Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew...
Daniel Furtado, Marcus Pennington
Benjamin May, Cameron Buchanan, Andrew Mabbitt, Dave...
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
Joel Lawhead
Arunkumar Krishnakumar
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
Ashwin Pajankar, Richard Grimmett, Matthew Poole, Arush...
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
Nat Welch
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
Neil Smyth
Pablo Iranzo Gómez, Pedro Ibanez Requena, Miguel...
Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
Mark Dunkerley
Reverse Engineering Armv8-A Systems. A practical guide to kernel, firmware, and TrustZone analysis
Austin Kim, Bojun Seo
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen