Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Languages
  • Ratings
  • File formats
  • Shelves

Discover (Random Books)

The Great Transformation: The Beginning of Our Religious Traditions

The Great Transformation: The Beginning of Our Religious Traditions

Karen Armstrong

Grape Expectations: A Family's Vineyard Adventure in France

Grape Expectations: A Family's Vineyard Adventure in France

Caro Feely

Badditives!

Badditives!

Linda Bonvie

Coercing Virtue: The Worldwide Rule of Judges

Coercing Virtue: The Worldwide Rule of Judges

Robert H. Bork

Category: Network Security

Zero Trust Networks: Building Secure Systems in Untrusted Network

Zero Trust Networks: Building Secure Systems in Untrusted Network

Razi Rais & Christina Morillo & Evan Gilman

Zero Trust Networks, Second Edition

Zero Trust Networks, Second Edition

Razi Rais & Christina Morillo & Evan Gilman & Doug Barth

TLS Mastery

TLS Mastery

Michael W. Lucas

IT Mastery (16)

NoSQL Web Development With Apache Cassandra

NoSQL Web Development With Apache Cassandra

Deepak Vohra

Mastering Linux Device Driver Development: Write Custom Device Drivers to Support Computer Peripherals in Linux Operating Systems

Mastering Linux Device Driver Development: Write Custom Device ...

John Madieu

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend

Chris Binnie

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

Himanshu Kumar

Learn Cisco Network Administration in a Month of Lunches

Learn Cisco Network Administration in a Month of Lunches

Ben Piper

ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests

ISC2 CISSP Certified Information Systems Security Professional ...

Mike Chapple & David Seidl

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces

Corey J. Ball

Getting Started With Deep Learning for Natural Language Processing: Learn How to Build NLP Applications With Deep Learning

Getting Started With Deep Learning for Natural Language Processing: ...

Sunil Patel

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems

Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...

Matt Hand

Elastix Unified Communications Server Cookbook

Elastix Unified Communications Server Cookbook

Gerardo Barajas Puente

The Digital Silk Road: China's Quest to Wire the World and Win the Future

The Digital Silk Road: China's Quest to Wire the World and Win ...

Jonathan E. Hillman

Cloud Native Security

Cloud Native Security

Chris Binnie & Rory McCune

CISA Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives

CISA Certified Information Systems Auditor Study Guide: Covers ...

Peter H. Gregory & Mike Chapple

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills

ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...

Clint E. Bodungen

Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs

Nick Aleks & Dolev Farhi

Book Details

...