Engineering Secure De.. By: Merli Dominik
Hacking APIs By: Ball Corey J.
Metasploit, 2nd Editi.. By: Kearns Devon
Practical Binary Anal.. By: Andriesse Dennis
Practical Malware Ana.. By: MichaelHonig Sikorski
Tangled Web By: Michal Zalewski
Windows Security Inte.. By: Forshaw James
Foundations of Crypto.. By: Oded Goldreich
Applied Cryptography:.. By: Schneier Bruce
CISA: Certified Infor.. By: Keele Allen
IT Governance By: Watkins Steve
NIS2 Navigator's Hand.. By: Benda Michiel
loading more results .....