Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

The Girl With the Phony Name

The Girl With the Phony Name

Charles Mathes

How to Talk to Absolutely Anyone: Confident Communication for Work, Life and Relationships

How to Talk to Absolutely Anyone: Confident Communication for ...

Mark Rhodes

Blessing the Hands That Feed Us: Lessons From a 10-Mile Diet

Blessing the Hands That Feed Us: Lessons From a 10-Mile Diet

Vicki Robin

The New PhD: How to Build a Better Graduate Education

The New PhD: How to Build a Better Graduate Education

Leonard Cassuto & Robert Weisbuch

Category: Network Security

CISA Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives

CISA Certified Information Systems Auditor Study Guide: Covers ...

Peter H. Gregory & Mike Chapple

ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests

ISC2 CISSP Certified Information Systems Security Professional ...

Mike Chapple & David Seidl

Zero Trust Networks, Second Edition

Zero Trust Networks, Second Edition

Razi Rais & Christina Morillo & Evan Gilman & Doug Barth

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...

Clint E. Bodungen

Mastering Linux Device Driver Development: Write Custom Device Drivers to Support Computer Peripherals in Linux Operating Systems

Mastering Linux Device Driver Development: Write Custom Device ...

John Madieu

Zero Trust Networks: Building Secure Systems in Untrusted Network

Zero Trust Networks: Building Secure Systems in Untrusted Network

Razi Rais & Christina Morillo & Evan Gilman

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...

Matt Hand

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces

Corey J. Ball

Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs

Nick Aleks & Dolev Farhi

TLS Mastery

TLS Mastery

Michael W. Lucas

IT Mastery (16)

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend

Chris Binnie

Cloud Native Security

Cloud Native Security

Chris Binnie & Rory McCune

NoSQL Web Development With Apache Cassandra

NoSQL Web Development With Apache Cassandra

Deepak Vohra

Learn Cisco Network Administration in a Month of Lunches

Learn Cisco Network Administration in a Month of Lunches

Ben Piper

The Digital Silk Road: China's Quest to Wire the World and Win the Future

The Digital Silk Road: China's Quest to Wire the World and Win ...

Jonathan E. Hillman

Getting Started With Deep Learning for Natural Language Processing: Learn How to Build NLP Applications With Deep Learning

Getting Started With Deep Learning for Natural Language Processing: ...

Sunil Patel

Elastix Unified Communications Server Cookbook

Elastix Unified Communications Server Cookbook

Gerardo Barajas Puente

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

Himanshu Kumar

Book Details

...