- [Matt-Walker]-Certified-Ethical-Hacker-Exam-Guide
- How to Hack Like a Pornstar
- Hacker Playbook
- Hacker Playbook -2
- Hacker Playbook -3
- How to Hack Like a Pornstar
- Hacker Playbook
- Hacker Playbook -2
- Hacker Playbook -3
- Metasploit – The Penetration Tester′s Guide
- Penetration Testing: A Hands-On Introduction to Hacking
- Red Team Development and Operations A Practical Guide
- Computer Hacking Forensic Investigator (CHFI)
- Richard Blum - Professional Assembly Language (2005, Wrox)
- Reversing secrets of reverse engineering by Eldad Eilam
- The Red Team Guide by Peerlyst
- Monnappa K A - Learning Malware Analysis_ Explore the concepts, tools, and
- The Red Team Guide by Peerlyst
- Monnappa K A - Learning Malware Analysis_ Explore the concepts, tools, and
techniques to analyze and investigate Windows malware-Packt Publishing (2018)
- Computer-Networking-A-Top-Down-Approach-7th-Edition
- Thomas Wilhelm - Professional Penetration Testing_ Creating and Operating a
Formal Hacking Lab (2009)
- 64-ia-32-architectures-software-developer-vol-1-manual- Unleashing the Ideavirus by Seth Godin, Malcolm Gladwell
- Michal Jaworski, Tarek Ziade - Expert Python Programming (2019, Packt
Publishing)
-ubuntu and Centos linux server administration by MD. Tanvir Rahman
- Extreme C Taking you to the limit in Concurrency, OOP, and the most advanced
capabilities of C by Kamran Amini
- First Course in Algorithms Through Puzzles by Ryuhei Uehara
- Introduction to algorithms by Thomas H. Cormen, Charles E. Leiserson, Ronald
L. Rivest, Clifford Stein
- C++ A Beginners Guide, Second Edition by Herbert Schildt
- Foundations of Game Engine Development, Volume 1 Mathematics by Eric
Lengyel
- Unity 2D Game Development by Dave Calabrese
- Sets, logic and maths for computing by David Makinson (auth.)
- Mathematics for Game Developers
- Computer-Science-Distilled
- Data Structures and Algorithms - Narasimha Karumanchi
- Practical Malware Analysis
- Hacking the art of exploitation
- The C Programming Language by Brian W. Kernighan, Dennis M. Ritchie
- The Shellcoder's Handbook Discovering and Exploiting Security Holes
- Penetration Testing Shellcode. Detect, exploit, and secure network-level and operating system vulnerabilities by Hamza Megahed
- Python for Offensive PenTest by Hussam Khrais
- How to Hack Computers how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning by Tope, Joel (z-lib.org)
- lpic1
- Mastering Reverse Engineering 1st Edition
- Cyber Operations Building, Defending, and Attacking 2nd Edition
- UNIX and Linux System Administration Handbook
- CPENT - Certified Penetration Testing Professional
- Mastering Linux Administration A comprehensive guide to installing
- Attacking Network Protocols_ A Hacker’s Guide to Capture, Analysis, and Exploitation
- The Pentester BluePrint Starting a Career as an Ethical_Hacker
- Linux System Programming Techniques - Become a proficient Linux system programmer using expert recipes and techniques by Jack-Benny Persson
- Learn C the Hard Way Practical Exercises on the Computational Subjects You Keep Avoiding (Till lesson 30)
- CEH v11[2020]
- SEC 552 (Bug Bounties and responsible disclosure)[2021]
- Learn Python 3 the Hard Way A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code by Zed A. Shaw
- The Official Radare 2 Book
- Notsosecure - Advanced Web Hacking
- Python Tricks A Buffet of Awesome Python Features
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment