Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

All the Presidents' Pets: The Story of One Reporter Who Refused to Roll Over

All the Presidents' Pets: The Story of One Reporter Who Refused ...

Mo Rocca

Hearts West: True Stories of Mail-Order Brides on the Frontier

Hearts West: True Stories of Mail-Order Brides on the Frontier

Chris Enss

Hostaged Vatican

Hostaged Vatican

Gar Wilson & William Fieldhouse

Phoenix Force (26)

The Violated

The Violated

Bill Pronzini

Category: Network Security

Zero Trust Networks: Building Secure Systems in Untrusted Network

Zero Trust Networks: Building Secure Systems in Untrusted Network

Razi Rais & Christina Morillo & Evan Gilman

Zero Trust Networks, Second Edition

Zero Trust Networks, Second Edition

Razi Rais & Christina Morillo & Evan Gilman & Doug Barth

TLS Mastery

TLS Mastery

Michael W. Lucas

IT Mastery (16)

NoSQL Web Development With Apache Cassandra

NoSQL Web Development With Apache Cassandra

Deepak Vohra

Mastering Linux Device Driver Development: Write Custom Device Drivers to Support Computer Peripherals in Linux Operating Systems

Mastering Linux Device Driver Development: Write Custom Device ...

John Madieu

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend

Chris Binnie

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

Himanshu Kumar

Learn Cisco Network Administration in a Month of Lunches

Learn Cisco Network Administration in a Month of Lunches

Ben Piper

ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests

ISC2 CISSP Certified Information Systems Security Professional ...

Mike Chapple & David Seidl

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces

Corey J. Ball

Getting Started With Deep Learning for Natural Language Processing: Learn How to Build NLP Applications With Deep Learning

Getting Started With Deep Learning for Natural Language Processing: ...

Sunil Patel

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...

Matt Hand

Elastix Unified Communications Server Cookbook

Elastix Unified Communications Server Cookbook

Gerardo Barajas Puente

The Digital Silk Road: China's Quest to Wire the World and Win the Future

The Digital Silk Road: China's Quest to Wire the World and Win ...

Jonathan E. Hillman

Cloud Native Security

Cloud Native Security

Chris Binnie & Rory McCune

CISA Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives

CISA Certified Information Systems Auditor Study Guide: Covers ...

Peter H. Gregory & Mike Chapple

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...

Clint E. Bodungen

Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs

Nick Aleks & Dolev Farhi

Book Details

...