Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

Last Call for Blackford Oakes

Last Call for Blackford Oakes

William F. Buckley, Jr.

I'm Feeling Lucky: The Confessions of Google Employee Number 59

I'm Feeling Lucky: The Confessions of Google Employee Number ...

Douglas Edwards

Leaves of Grass

Leaves of Grass

Walt Whitman

Grand Thieves & Tomb Raiders: How British Video Games Conquered the World

Grand Thieves & Tomb Raiders: How British Video Games Conquered ...

Rebecca Levene & Magnus Anderson

Category: Network Security

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

Himanshu Kumar

Elastix Unified Communications Server Cookbook

Elastix Unified Communications Server Cookbook

Gerardo Barajas Puente

Getting Started With Deep Learning for Natural Language Processing: Learn How to Build NLP Applications With Deep Learning

Getting Started With Deep Learning for Natural Language Processing: ...

Sunil Patel

The Digital Silk Road: China's Quest to Wire the World and Win the Future

The Digital Silk Road: China's Quest to Wire the World and Win ...

Jonathan E. Hillman

Learn Cisco Network Administration in a Month of Lunches

Learn Cisco Network Administration in a Month of Lunches

Ben Piper

NoSQL Web Development With Apache Cassandra

NoSQL Web Development With Apache Cassandra

Deepak Vohra

Cloud Native Security

Cloud Native Security

Chris Binnie & Rory McCune

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend

Chris Binnie

TLS Mastery

TLS Mastery

Michael W. Lucas

IT Mastery (16)

Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs

Nick Aleks & Dolev Farhi

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces

Corey J. Ball

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...

Matt Hand

Zero Trust Networks: Building Secure Systems in Untrusted Network

Zero Trust Networks: Building Secure Systems in Untrusted Network

Razi Rais & Christina Morillo & Evan Gilman

Mastering Linux Device Driver Development: Write Custom Device Drivers to Support Computer Peripherals in Linux Operating Systems

Mastering Linux Device Driver Development: Write Custom Device ...

John Madieu

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...

Clint E. Bodungen

Zero Trust Networks, Second Edition

Zero Trust Networks, Second Edition

Razi Rais & Christina Morillo & Evan Gilman & Doug Barth

ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests

ISC2 CISSP Certified Information Systems Security Professional ...

Mike Chapple & David Seidl

CISA Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives

CISA Certified Information Systems Auditor Study Guide: Covers ...

Peter H. Gregory & Mike Chapple

Book Details

...