Metasploit: The Penetration Tester's Guide - David Kennedy
- Jim O'Gorman
- Devon Kearns
- Mati Aharoni
| 0 | 0 reads |
Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 4.5 | 2 reads |
Reversing Secrets of Reverse Engineering | 4 | 2 reads |
| 0 | 0 reads |
| 0 | 3 reads |
The Tao of Vegetable Gardening: Cultivating Tomatoes, Greens, Peas, Beans, Squash, Joy, and Serenity | 0 | 0 reads |
Practical Packet Analysis | 5 | 1 read |
Google Hacking for Penetration Testers, Volume 1 | 0 | 0 reads |
The web application hacker's handbook | 0 | 0 reads |
The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes - Jack Koziol
- Chris Anley
- John Heasman
| 0 | 0 reads |
| 4.36 | 63 reads |
Speeches That Changed the World | 0 | 1 read |
The Winter Harvest Handbook: Four Season Vegetable Production Using Deep-Organic Techniques and Unheated Greenhouses | 0 | 1 read |
The resilient farm and homestead | 0 | 2 reads |
Growing Object-oriented Software, Guided by Tests | 4.2 | 12 reads |
Android Hacker's Handbook - Joshua J. Drake
- Zach Lanier
- Collin Mulliner
- Pau Oliva Fora
- Stephen A. Ridley
- Georg Wicherski
| 0 | 0 reads |
| 0 | 1 read |
Penetration Testing: A Hands-On Introduction to Hacking | 0 | 0 reads |
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities - Mark Dowd
- John McDonald
- Justin Schuh
| 0 | 0 reads |
| 0 | 0 reads |
| 4 | 2 reads |
| 0 | 0 reads |
Cryptography Engineering Cryptography Engineering: Design Principles and Practical Applications - Niels Ferguson
- Bruce Schneier
- Tadayoshi Kohno
| 4 | 4 reads |
| 4.5 | 4 reads |
The Body: A Guide for Occupants | 4.18 | 154 reads |
El Vendedor Mas Grande Del Mundo/Greatest Salesman on Earth | 3.79 | 18 reads |
| 4.17 | 36 reads |
| 3 | 4 reads |