Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Series
  • Authors
  • Languages
  • File formats
  • Shelves
  • RPGs (Public)

Category: Computers

The Art of Mac Malware, Volume 2

The Art of Mac Malware, Volume 2

Patrick Wardle

Serious Cryptography

Serious Cryptography

Jean-Philippe Aumasson

Metasploit

Metasploit

David Kennedy, et al.

Cybersecurity Tabletop Exercises: From Planning to Execution

Cybersecurity Tabletop Exercises: From Planning to Execution

Robert Lelewski & John Hollenberger

Black Hat Bash

Black Hat Bash

Dolev Farhi & Nick Aleks

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Practical Malware Analysis: The Hands-On Guide to Dissecting ...

Michael Sikorski & Andrew Honig

Practical Forensic Imaging

Practical Forensic Imaging

Bruce Nikkel

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

Pentesting Azure Applications: The Definitive Guide to Testing ...

Matt Burrough

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...

Alex Matrosov & Eugene Rodionov & Sergey Bratus

Crypto Dictionary

Crypto Dictionary

Jean-Philippe Aumasson

Black Hat Python

Black Hat Python

Justin Seitz & Tim Arnold

Bug Bounty Bootcamp

Bug Bounty Bootcamp

Vickie Li

The Art of Cyberwarfare

The Art of Cyberwarfare

Jon DiMaggio

Practical Social Engineering

Practical Social Engineering

Joe Gray

Hacking APIs

Hacking APIs

Corey J. Ball

Black Hat GraphQL

Black Hat GraphQL

Nick Aleks & Dolev Farhi

Microcontroller Exploits

Microcontroller Exploits

Travis Goodspeed

Locksport: A Hacker’s Guide to Lockpicking, Impressioning, and Safe Cracking

Locksport: A Hacker’s Guide to Lockpicking, Impressioning, and ...

Jos Weyers & Matt Burrough & Walter Belgers & BandEAtoZ & Nigel K. Tolley

Book Details

...