1
Pentesting Azure Applicatio...

by
4.16 avg rating — 44 ratings
Rate this book
Clear rating
2
Practical Forensic Imaging:...

by
4.19 avg rating — 31 ratings
Rate this book
Clear rating
3
The Tangled Web: A Guide to...

by
4.04 avg rating — 556 ratings
Rate this book
Clear rating
4
Malware Data Science: Attac...

by
3.91 avg rating — 53 ratings
Rate this book
Clear rating
5
Attacking Network Protocols...

by
3.91 avg rating — 132 ratings
Rate this book
Clear rating
6
Real-World Bug Hunting: A F...

by
4.20 avg rating — 144 ratings
Rate this book
Clear rating
7
Foundations of Information ...

by
4.06 avg rating — 127 ratings
Rate this book
Clear rating
8
Serious Cryptography: A Pra...

by
4.29 avg rating — 381 ratings
Rate this book
Clear rating
9
Practical Malware Analysis:...

by
4.47 avg rating — 617 ratings
Rate this book
Clear rating
10
Rootkits and Bootkits: Reve...

by
4.45 avg rating — 49 ratings
Rate this book
Clear rating
11
Crypto Dictionary: 500 Tast...

by
4.04 avg rating — 26 ratings
Rate this book
Clear rating
12
Cyberjutsu: Cybersecurity f...

by
3.56 avg rating — 52 ratings
Rate this book
Clear rating
13
Black Hat Go: Go Programmin...

by
3.70 avg rating — 90 ratings
Rate this book
Clear rating
14
How to Hack Like a Ghost: B...

by
4.53 avg rating — 59 ratings
Rate this book
Clear rating
15
Practical IoT Hacking: The ...

by
4.31 avg rating — 45 ratings
Rate this book
Clear rating
16
Black Hat Python: Python Pr...

by
4.12 avg rating — 619 ratings
Rate this book
Clear rating
17
The Ghidra Book: The Defini...

by
4.30 avg rating — 40 ratings
Rate this book
Clear rating
18
Ethical Hacking: A Hands-on...

by
4.40 avg rating — 35 ratings
Rate this book
Clear rating


No comments have been added yet.