|
The Beginner's Guide to the Internet Underground
by
3.72 avg rating — 47 ratings
—
published
2013
—
2 editions
|
|
|
OSINT Investigations: We know what you did that summer
by
|
|
|
Build A Bigger Table: Creating Space to Discuss Life & Faith
by
|
|
|
CSI Linux: Investigator's Starting Guide
by
it was amazing 5.00 avg rating — 5 ratings
—
2 editions
|
|
|
Threat Hunting, Hacking, and Intrusion Detection - (SCADA, Dark Web, and APTs): Cyber Secrets 1
by
|
|
|
Dive Into the 5th Domain: Threat Intelligence: Cyber Secrets 2
by
4.25 avg rating — 4 ratings
|
|
|
The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer
by
really liked it 4.00 avg rating — 4 ratings
—
2 editions
|
|
|
Incident Response: Evidence Preservation and Collection
by
|
|
|
High School Math Made Understandable Book 3: Math 9, 10, 11, and 12
by
it was amazing 5.00 avg rating — 2 ratings
—
2 editions
|
|
|
IWC-Lab: Weaponizing PowerShell 101: Remote password cracking with Hydra (IWC-Lab: Kali Book 4)
by
it was amazing 5.00 avg rating — 2 ratings
|
|
|
Betty the Yeti
by
it was amazing 5.00 avg rating — 2 ratings
—
2 editions
|
|
|
Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Secrets: 3
by
really liked it 4.00 avg rating — 2 ratings
|
|
|
IWC-Lab: Using Tor in Kali: Tor on Kali for Pen-testing and profit (IWC-Lab: Kali Book 2)
by
really liked it 4.00 avg rating — 2 ratings
—
published
2015
|
|
|
Game Freak
by
it was amazing 5.00 avg rating — 1 rating
—
published
2013
—
3 editions
|
|
|
38 Poems for Stephenie
by
it was amazing 5.00 avg rating — 1 rating
—
published
2014
—
2 editions
|
|
|
IWC-Lab: Kali Forensic Data Recovery: Levels of data destruction and recovery using Kali
by
2.50 avg rating — 2 ratings
—
published
2014
|
|
|
Web App Hacking: Carnage & Pwnage
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Don't Bother
by
did not like it 1.00 avg rating — 1 rating
—
published
2014
|
|
|
Web App Hacking: Carnage & Pwnage
by
did not like it 1.00 avg rating — 1 rating
|
|
|
Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind
by
0.00 avg rating — 0 ratings
|
|
|
Cryptography Basics & Practical Usage (IWC Labs Attack Book 1)
by
0.00 avg rating — 0 ratings
|
|
|
Cryptography Basics & Practical Usage
by
0.00 avg rating — 0 ratings
|
|
|
The Legend of Bike Wrench Brewer: The Mostly True Story of The Origin
by
0.00 avg rating — 0 ratings
|
|
|
Privilege Escalation: A Stairway to Heaven (IWC Labs Attack Book 4)
by
|
|
|
Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence
by
0.00 avg rating — 0 ratings
|
|
|
IWC HACKING LAB USING KALI: Build a portable Cyber Live Fire Range (CLFR) - Second Edition (IWC-Lab: Kali Book 3)
by
|
|
|
IWC-Lab: Weaponizing PowerShell 101: Port scanner and Banner grabber
by
0.00 avg rating — 0 ratings
|
|
|
Time, Timing, & Timeliness: As Taught by Turtle
by
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.