Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

Let the Right One In

Let the Right One In

John Avjide Lindquist

The Eleventh Day: The Full Story of 9/11 and Osama Bin Laden

The Eleventh Day: The Full Story of 9/11 and Osama Bin Laden

Anthony Summers & Robbyn Swan

Distant Thunder

Distant Thunder

Stuart Woods

Stone Barrington (63)

The Game: Penetrating the Secret Society of Pickup Artists

The Game: Penetrating the Secret Society of Pickup Artists

Neil Strauss

Category: Network Security

NoSQL Web Development With Apache Cassandra

NoSQL Web Development With Apache Cassandra

Deepak Vohra

Zero Trust Networks, Second Edition

Zero Trust Networks, Second Edition

Razi Rais & Christina Morillo & Evan Gilman & Doug Barth

Zero Trust Networks: Building Secure Systems in Untrusted Network

Zero Trust Networks: Building Secure Systems in Untrusted Network

Razi Rais & Christina Morillo & Evan Gilman

Elastix Unified Communications Server Cookbook

Elastix Unified Communications Server Cookbook

Gerardo Barajas Puente

Learn Cisco Network Administration in a Month of Lunches

Learn Cisco Network Administration in a Month of Lunches

Ben Piper

Getting Started With Deep Learning for Natural Language Processing: Learn How to Build NLP Applications With Deep Learning

Getting Started With Deep Learning for Natural Language Processing: ...

Sunil Patel

Mastering Linux Device Driver Development: Write Custom Device Drivers to Support Computer Peripherals in Linux Operating Systems

Mastering Linux Device Driver Development: Write Custom Device ...

John Madieu

TLS Mastery

TLS Mastery

Michael W. Lucas

IT Mastery (16)

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

Himanshu Kumar

The Digital Silk Road: China's Quest to Wire the World and Win the Future

The Digital Silk Road: China's Quest to Wire the World and Win ...

Jonathan E. Hillman

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...

Matt Hand

CISA Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives

CISA Certified Information Systems Auditor Study Guide: Covers ...

Peter H. Gregory & Mike Chapple

ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests

ISC2 CISSP Certified Information Systems Security Professional ...

Mike Chapple & David Seidl

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...

Clint E. Bodungen

Cloud Native Security

Cloud Native Security

Chris Binnie & Rory McCune

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend

Chris Binnie

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces

Corey J. Ball

Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs

Nick Aleks & Dolev Farhi

Book Details

...