1
Pentesting Azure Applicatio...

by
4.14 avg rating — 43 ratings
Rate this book
Clear rating
2
Practical Forensic Imaging:...

by
4.21 avg rating — 29 ratings
Rate this book
Clear rating
3
The Tangled Web: A Guide to...

by
4.04 avg rating — 554 ratings
Rate this book
Clear rating
4
Malware Data Science: Attac...

by
3.88 avg rating — 52 ratings
Rate this book
Clear rating
5
Attacking Network Protocols...

by
3.93 avg rating — 128 ratings
Rate this book
Clear rating
6
Real-World Bug Hunting: A F...

by
4.20 avg rating — 139 ratings
Rate this book
Clear rating
7
Foundations of Information ...

by
4.06 avg rating — 126 ratings
Rate this book
Clear rating
8
Serious Cryptography: A Pra...

by
4.28 avg rating — 379 ratings
Rate this book
Clear rating
9
Practical Malware Analysis:...

by
4.47 avg rating — 605 ratings
Rate this book
Clear rating
10
Rootkits and Bootkits: Reve...

by
4.49 avg rating — 45 ratings
Rate this book
Clear rating
11
Crypto Dictionary: 500 Tast...

by
4.04 avg rating — 25 ratings
Rate this book
Clear rating
12
Cyberjutsu: Cybersecurity f...

by
3.56 avg rating — 52 ratings
Rate this book
Clear rating
13
Black Hat Go: Go Programmin...

by
3.71 avg rating — 87 ratings
Rate this book
Clear rating
14
How to Hack Like a Ghost: B...

by
4.52 avg rating — 58 ratings
Rate this book
Clear rating
15
Practical IoT Hacking: The ...

by
4.30 avg rating — 43 ratings
Rate this book
Clear rating
16
Black Hat Python: Python Pr...

by
4.12 avg rating — 614 ratings
Rate this book
Clear rating
17
The Ghidra Book: The Defini...

by
4.32 avg rating — 38 ratings
Rate this book
Clear rating
18
Ethical Hacking: A Hands-on...

by
4.38 avg rating — 34 ratings
Rate this book
Clear rating


No comments have been added yet.